Cloud Security

Cloud Security | News, how-tos, features, reviews, and videos

Let's Encrypt automated encryption gears

Black Hat 2019: 3 cybersecurity concerns and 3 things that give hope

At this year's Black Hat, it was evident that several cybersecurity issues remain a concern, but the industry is making progress.

Mastery of technology skills + knowledge.

12 things every computer security pro should know

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know.

Insider Pro  >  Plug-and-play network security

Review: How Perimeter 81 provides a near plug-and-play network security service

Starting with the concept of zero trust, VPN tunneling and secure network access as a service, Perimeter 81 is now providing an almost plug-and-play solution for more elements of cybersecurity served through the cloud and on demand.

black hat / hacker / spotlight / binary overlay

Looking for answers at Black Hat 2019: 5 important cybersecurity issues

As Black Hat 2019 begins, the cybersecurity topics top of mind include network security platforms, threat detection/response services, new cloud security strategies, and clarification around security analytics.

Capital One  >  hack

Is the cloud lulling us into security complacency?

In other words, is reliance on cloud services lulling us into security complacency?

venmo data breach lock security breach circuit board by weerapatkiatdumrong getty

6 lessons from Venmo’s lax approach to API security

Cyber criminals are targeting application programming interfaces to steal sensitive data. Recent exposures and hacks at companies like Venmo, Facebook and Google present lessons to improve API security.

cloud security expert casb binary cloud computing cloud security by metamorworks getty

What is a CASB? What you need to know before you buy

Cloud access security brokers have come a long way in a few years and can be an effective way to manage authentication and encryption across cloud and on-premise systems.

CISOs must shape IT security programs around overall corporate strategy: Gaurav Agarwal, Symantec

Enterprises need to deploy an integrated cyber defense strategy or a single-platform approach that can protect across endpoints, networks, applications and cloud, says Gaurav Agarwal, Managing Director, India & SAARC, Symantec.

Big data analytics, AI and blockchain can help reclaim surrendered ground: Anil Bhasin, Palo Alto Networks 

We generally assume that all threats are ‘information stealing’ in nature. But that has changed, and the threats have become multi-faceted, points out Anil Bhasin, regional vice president, India & SAARC, Palo Alto Networks.

Next big wave of innovation in cybersecurity solution is ML and AI: Venkat Krishnapur, McAfee India

If we were to summarize data breaches and infiltrations, the key causes usually are the 4 P’s: People, phishing, passwords and patching, says Venkat Krishnapur, Vice-President of Engineering and Managing Director, McAfee India. 

CSOs must develop a training program focused on advanced threats: Nilesh Jain, Trend Micro

According to Nilesh Jain, Vice President, South East Asia and India at Trend Micro, creating awareness of the latest attack methods, and educating executives and privileged users will reduce the chances of attacks. 

Businesses must focus on digital risk management : Rajnish Gupta, RSA

Digital risk is a new form of risk and is larger than the security or cyber risks we faced earlier, says Rajnish Gupta, Regional Director–India & SAARC, RSA (A Dell Technologies Company)

Security and business are intertwined: Prasad Mandava, Akamai India

According to Prasad Mandava, Managing Director & VP of Engineering-India at Akamai Technologies, business risk and security risk are inherently proportional to each other today and can’t exist independently of one another.

Automated threat intelligence is a valuable tool against attack vectors: Rajesh Maurya, Fortinet

Automated, actionable threat intelligence shared at speed and scale shrinks the necessary windows of detection. It is able to trace and intervene against attack workflows that move between network ecosystems and provides the automated...

Adopt a ‘trust, but verify’ approach for a zero trust security environment: Edgar Dias, F5 Networks

With enterprises using digital platforms to engage better with customers, opening digital assets to potential and new customers creates a whole new bunch of security challenges. Edgar Dias, MD, India at F5 Networks, tells us how CSOs...

distributed / decentralized network connections across the globe

How a decentralized cloud model may increase security, privacy

A new cloud model can support scalable applications while retaining safeguards of a decentralized, trust-minimized ecosystem.

Vulnerability management, surface visibility is imperative for modern CSOs: Gerry Sillars

Skybox Security imparts huge advantage to organizations over the attackers by delivering advanced vulnerability and threat intelligence, says Gerry Sillars, APAC Chief at Skybox Security. 

Microsoft Cloud App Security

How to set up Microsoft Cloud App Security

Microsoft's Cloud App Security add-on will alert you to suspicious sign-in activity in Office 365, Azure and other cloud apps using standard templates or custom policies.

keeping the cloud secure cloud security lock padlock private cloud

AWS re:Inforce 2019: Amazon shows its dedication to cloud security

AWS re:Inforce sets the bar for cloud security and the industry. Now Amazon needs to reinforce this leadership in an era of dynamic software development and hybrid cloud computing.

Spear phishing has come a long way since the ‘Nigerian prince’ racket: Hatem Naguib, Barracuda

While the CISO’s job has gotten harder, the dark web has made hacking a piece of cake for the bad guys. Hatem Naguib, SVP & COO Barracuda Networks walks us through the current threat landscape.

Load More
You Might Also Like