Search results: cloud security

[Executive Briefing] Avoiding a Cloud Security Collision With Policy-Based Automation

[Executive Briefing] Avoiding a Cloud Security Collision With Policy-Based Automation

|
Shift security left, right, up and down to align teams, reduce risk and empower developers to move faster in the cloud. As the scale and complexity of cloud environments grow, so do the ...
Cloud Security Breaches and How to Prevent Them

Cloud Security Breaches and How to Prevent Them

|
Cloud security stories are in front of us every day. Breaches and intrusions are rising at a rapid pace and media coverage can’t keep up. Bad actors are becoming cleverer and internal ...
cloud security stack

How to Build Your DevOps Cloud Security Stack

For a long time, the best approach to network and data security was network segregation. If you protect your intranet from the Internet, there are significantly The post How to Build Your ...

Cloud Security Concerns in 2021

Findings from our annual State of the Software Supply Chain Report, which looks at the use of  open source software development, told us two main things:  ...

Taking a Look at AWS and Cloud Security Monitoring

More and more companies understand the benefits of cloud computing, which is making their migration to the cloud more rapid. Per IDG’s 2020 Cloud Computing Study, 81% of organizations said that they’ve ...
Lacework cloud security fortinet Juniper strategy IAM Datadog CSA cloud security SMBs cloud

Cloud Workload Security

Cloud observability and security are quickly becoming mainstays necessary to manage and secure cloud-based applications and infrastructure. At Black Hat 2021, Datadog announced their new Cloud Workload Security offering, providing real-time eBPF-powered ...
Security Boulevard

ThycoticCentrify Enhances DevOps Security with Certificate-Based Authentication and Configurable Time-to-Live for All Cloud Platforms

| | Company News
Redwood City, Calif. and Washington D.C. — August 24, 2021 – ThycoticCentrify, a leading provider of cloud identity security solutions formed by the merger of privileged access management (PAM) leaders Thycotic and ...
Qualys tactical CISO

Qualys Acquires TotalCloud to Gain No-Code Security Tool

Qualys this week announced it has agreed to acquire TotalCloud, a provider of a no-code platform that will enable cybersecurity teams to orchestrate workflows more easily across the company’s portfolio of cybersecurity ...
Security Boulevard

Managing Entitlements and Access in the Cloud is a Leading Security Risk

| | SBN News
Public cloud environments offer a flexible way for organizations to provision resources, spin up containers based on ever-changing requirements, and more. Public cloud deployments can quickly turn into a complicated highway of ...

Overcome the Security and Compliance Challenges in DevSecOps

Organizations are under tremendous pressure to deliver innovative products and stick to tight release timelines. To keep up with the rapid release schedule, engineering teams are adopting the DevOps model for its ...

Secure Guardrails