AWS Data Exposed on GitHub

| | Blog
Five hours isn’t very long. It’s a flight from New York to Los Angeles. It’s a little over half of a standard workday. But when viewed from the perspective of exposed data, it’s an eternity – or at least long … Read more The post AWS Data Exposed on GitHub ... Read More

CoStar Group | Customer Case Study

| | case-study
Case Study: How DivvyCloud Enables Continuous Multi-Cloud Security and Compliance Best Practices for CoStar During Mergers and Acquisitions Overview CoStar is the leading provider of commercial real estate information, analytics, and online marketplaces. They conduct expansive, ongoing research to produce … Read more The post CoStar Group | Customer Case ... Read More

Misconfigurations Can Happen to Anyone, Even Microsoft

| | Blog
Over the last 44 years, Microsoft has become a trusted name in technology. Their logo, a familiar and colorful quartet of squares, is a visual comfort to their enormous user community. Consumers have welcomed the company’s products into their homes … Read more The post Misconfigurations Can Happen to Anyone, ... Read More

How Protected is Your Health Information?

| | Blog
Protected Health Information (PHI) is the term given to health data created, received, stored, or transmitted by HIPAA-covered entities and their business associates in relation to the provision of healthcare, healthcare operations, and payment for healthcare services. This might not … Read more The post How Protected is Your Health ... Read More

Five CISO Priorities

| | Blog
Dark Reading recently published an article describing the top five near-term priorities according to a group of seven CISOs. We think this compilation of concerns is pretty accurate—it certainly encompasses what we’re hearing from our customers. This list is interesting … Read more The post Five CISO Priorities appeared first ... Read More