Search results: cloud security

Cloud Security Stories: From Risky Permissions to Ransomware Execution

Cloud Security Stories: From Risky Permissions to Ransomware Execution

In the sprawling cloud infrastructure of GlobalTech Inc., a meticulously planned ransomware attack was set in motion by a sophisticated adversary, codenamed Vector. Vector’s objective wasn’t just to encrypt data for a ...

Top Ten NSA and CISA Cloud Security Strategies

NSA and CISA release a  joint guide outlining ten pivotal cloud security strategies for enterprise In a business world dominated by cloud-based solutions, robust cloud security strategies for cloud environments have never ...
Aligning With NSA’s Cloud Security Guidance: Four Takeaways

Aligning With NSA’s Cloud Security Guidance: Four Takeaways

The National Security Agency (NSA), in conjunction with the Cybersecurity and Infrastructure Security Agency (CISA), recently released its “Top Ten Cloud Security Mitigation Strategies” for organizations to make their cloud environments more ...

Key Components of a Robust Cloud Security Maturity Strategy

A cloud security maturity strategy is dynamic and evolves over time to address new threats, technologies, and business requirements. It involves a holistic and proactive approach to security, emphasizing continuous improvement and ...
cloud attack surface management

Cloud Attack Surface Management(CASM): What is it? How does Strobes CASM help you with cloud security?

The cloud revolutionized how businesses operate, but with increased flexibility comes an expanded attack surface. Traditional security methods struggle to keep pace with the dynamic nature of cloud environments, making... The post ...
How better key management can close cloud security gaps troubling US government

How better key management can close cloud security gaps troubling US government

|
How better key management can close cloud security gaps troubling US government madhav Thu, 02/29/2024 - 05:38 In my first blog on this topic I noted a Treasury Department report released last ...
A Guide to Cloud Security Posture Management (CSPM)

A Guide to Cloud Security Posture Management (CSPM)

What is CSPM? Cloud Security Posture Management is about identifying and remediating security misconfigurations and risks to (IaaS) Infrastructure as a Service or (PaaS) Platform as a service environments ...

Future of Cloud Security: Predictions and Challenges

| | Blog
In our fast-paced digital world, cloud security has become a top priority for businesses and individuals. As the technology continues to grow, cloud-based systems are exposed to growing threats. Businesses increasingly rely ...
Essential Information on Cloud Security Services

Essential Information on Cloud Security Services

As traditional IT infrastructure proves inadequate for evolving business requirements. They are identified by experts who understand complex behaviors and ensure effective risk management.  To effectively manage these risks without compromising their ...
Cloud Security Podcast by Google - Merritt on Cloud Security

We Are Almost 3! Cloud Security Podcast by Google 2023 Reflections [MEDIUM BACKUP]

| | Medium Backup
 So, we (Tim and Anton, the crew behind the podcast) wanted to post another reflections blog based on our Cloud Security Podcast by Google being almost 3 (we will be 3 years old on Feb 11, 2024, ...