newsCohesity taps Amazon for generative AI, cloud-based securityThe cloud-based data management provider said today that its many of its generative AI features will soon be available on Amazon Bedrock.By Jon Gold13 Nov 20233 minsGenerative AICloud SecurityData and Information Security feature Keep it secret, keep it safe: the essential role of cybersecurity in document managementBy Linda Rosencrance08 Nov 20238 minsCSO and CISOCloud SecurityData and Information Securitynews Most cloud moves found rushed as adopters underrate associated risks: ReportBy Shweta Sharma06 Nov 20234 minsCloud Security brandpostSponsored by SysdigA blueprint for high-speed cloud-native security 06 Nov 20234 minsCloud Security featureHow to choose the best cloud security posture management toolsBy Linda Rosencrance 30 Oct 20238 minsThreat and Vulnerability ManagementCloud SecurityData and Information Security brandpostSponsored by Palo Alto NetworksCrucial insights for executives on CNAPPBy Zachary Malone, SE Academy Manager, Palo Alto Networks 24 Oct 20235 minsCloud Security newsLacework adds multiple extensions to its multicloud security platformBy Shweta Sharma 24 Oct 20233 minsCloud Security newsPalo Alto Networks updates Prisma Cloud with integrated cloud securityBy Shweta Sharma 19 Oct 20233 minsCloud Security opinion5 practical recommendations implementing zero trustBy Michelle Drolet 10 Oct 20236 minsZero TrustCloud SecurityNetwork Security ArticlesnewsMongoDB rolls out Queryable Encryption to secure sensitive data workflowsTechnology reduces risks of data exposure and can be used with AWS Key Management Service, Microsoft Azure Key Vault, and Google Cloud Key Management Service.By Michael Hill 15 Aug 2023 4 minsEncryptionCloud SecurityData and Information Securitynews analysisMultiple data center vulnerabilities could cripple cloud servicesVulnerabilities affect data center services commonly used by organizations and could be exploited by attackers to gain system access and perform remote code execution.By Michael Hill 12 Aug 2023 6 minsCloud SecurityVulnerabilitiesnewsGoogle Cloud launches Chronicle CyberShield to help government agencies tackle threatsThe solution enables governments to build cybersecurity skills and capabilities and facilitate knowledge sharing and collaboration.By Michael Hill 10 Aug 2023 4 minsGovernmentSecurity Operations CenterCloud SecuritynewsNew runtime security tool scans ongoing attacks in cloud workloadsSweet is a runtime security software that uses eBPF technology to scan and respond to runtime anomalies in cloud environments.By Shweta Sharma 10 Aug 2023 3 minsCloud SecuritySecurity Softwarenews analysisAttackers use Cloudflare Tunnel to proxy into victim networksExploiting Cloudflare Tunnel requires little skill and potentially could compromise and entire network.By Lucian Constantin 08 Aug 2023 6 minsCyberattacksCloud SecurityNetwork SecuritynewsKubernetes clusters under attack in hundreds of organizationsMalware and backdoors used in attacks affecting some Fortune 500 companies.By Michael Hill 08 Aug 2023 5 minsCloud SecurityNetwork SecurityOpen SourcenewsVectra AI unveils XDR platform with real-time attack signal intelligenceXDR platform uses native and third-party attack signals across hybrid cloud domains including AWS, Microsoft Azure, and Google Cloud as well as networks and endpoints.By Michael Hill 08 Aug 2023 4 minsThreat and Vulnerability ManagementCloud SecurityNetwork Securitynews analysisBeware of overly permissive Azure AD cross-tenant synchronization policiesA new proof of concept shows that attackers can use Azure AD CTS to leap to Microsoft and non-Microsoft application across tenants.By Lucian Constantin 02 Aug 2023 6 minsActive DirectoryAzure FunctionsCloud SecuritynewsIn new ransomware model, cloud provider acts as front for bad actors: reportA new report from anti-ransomware vendor Halcyon said that virtual private server provider Cloudzy is being used to host malicious activity from numerous sources.By Jon Gold 01 Aug 2023 3 minsRansomwareCloud SecuritynewsNew access management tool to focus on the least privileges ConductorOne’s cloud-based privileged access management product will allow security teams to grant just-in-time access to privileged resources.By Shweta Sharma 28 Jul 2023 3 minsCloud SecurityIdentity and Access ManagementnewsPalo Alto Networks adds new CI/CD security module to Prisma CloudNew module addresses security challenges of modern engineering ecosystems with capabilities spanning visibility, control, risk management, and breach detection.By Michael Hill 27 Jul 2023 5 minsCloud SecurityRisk ManagementbrandpostSponsored by NTTWhy automation capabilities are a critical part of a security leader’s success.Automation in cybersecurity brings a multitude of benefits that empower security leaders to tackle modern challenges head-on.By Brenden Bosch, Principal Specialist, Sales Enablement at NTT 20 Jul 2023 4 minsCloud SecuritySecurity Show more Show less View all Resources whitepaper The shift to a security approach for the full application stack This whitepaper discusses how technologists can optimize security for modern application stacks. The post The shift to a security approach for the full application stack appeared first on Whitepaper Repository. By WWT & AppDynamics 05 May 2023Application Performance ManagementEmerging TechnologyIT Management View all Video on demand videoHoneypots and the evolution of botnets | Salted Hash Ep 23Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm’s recent honeypot research, which gathered information showing how the bot landscape is evolving. 20 Apr 2018 12 minsAdvanced Persistent ThreatsFirewallsBackup and Recovery DJI's bounty problems and video surveillance programs | Salted Hash Ep 13 08 Jan 2018 21 minsData BreachHackingApplication Security Zero Trust networks and enterprise security strategy | Salted Hash Ep 12 18 Dec 2017 26 minsCloud SecurityCloud ComputingSecurity The latest on Azure Stack, cyberattacks, the next iPhone and ... keyboards 20 Jul 2017 41 minsAppleMicrosoftSmartphones See all videos Explore a topic Application Security Business Continuity Business Operations Careers Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos feature How a digital design firm navigated its SOC 2 audit By Alex Levin 28 Nov 202311 mins CertificationsCertificationsIT Training news GE investigates alleged data breach into confidential projects: Report By Shweta Sharma 27 Nov 20233 mins Data Breach opinion A year after ChatGPT’s debut, is GenAI a boon or the bane of the CISO’s existence? By Christopher Burgess 27 Nov 20236 mins Generative AIData and Information SecuritySecurity Practices podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University 16 Oct 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape 10 Oct 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication 06 Nov 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome 16 Oct 202315 mins CSO and CISO