Bitglass Security Spotlight: Quora and Healthcare Breaches

Bitglass Security Spotlight: Quora and Healthcare Breaches

Here are the top cybersecurity stories of recent weeks: 100 million Quora users affected by data breach First multi-state healthcare breach impacts 3.9 million Australia’s anti-encryption bill becomes law Unprotected MongoDB server ...
Public Clouds Spread Malware

Public Clouds: Fertile Ground to Spread Malware

Public cloud security has always been a challenge, and there is no indication that it will get easier. According to a McAfee study, for instance, cloud adoption increased 15 percent over the ...
Security Boulevard
What is Cloud Workload Security?

What is Cloud Workload Security?

A cloud workload is a distinct capacity or work function that we put on a cloud instance. It can be a Hadoop node, a Web server, a database, or a container, among ...
Evaluating Risk Critical to Cloud Security

Evaluating Risk Critical to Cloud Security

According to CloudAcademy’s “November 2018 Data Report,” the world is trending toward multi-cloud. In fact, multi-cloud environments have become such a reality that DevOps engineers are now expected to have concurrent proficiency ...
Security Boulevard

4 Big Security Lessons from the Marriott Starwood Data Breach

The post 4 Big Security Lessons from the Marriott Starwood Data Breach appeared first on Delta Risk ...

CompTIA Cloud+ Certification: An Overview

| | cloud computing
The use of the cloud continues to grow as private citizens and businesses see the benefits of offsite storage and shared services. Many companies are coming to rely on this technology, as ...
How well do email security gateways protect against targeted attacks?

How well do email security gateways protect against targeted attacks?

Email security test explores how and when services detect and stop threats. Latest report now online. This new email protection test shows a wide variation in the abilities of the services that ...
Cross-Platform FDE Simplified

Cross-Platform FDE Simplified

Until now, tools for enabling and managing full disk encryption (FDE) solutions have been limited to a single OS: capable of enforcing FDE exclusively on Macs® or Windows®, but generally not both ...
Ensuring a Secure Cloud Journey in a World of Containers

Ensuring a Secure Cloud Journey in a World of Containers

As organizations transition to the cloud, many are adopting microservice architecture to implement business applications as a collection of loosely coupled services, in order to enable isolation, scale, and continuous delivery for ...

Achieve Security Through Compliance in the Cloud

| | CIS, Cloud, Compliance
Digging through my cupboards recently, I came across my old collection of 3½ floppy disks. It’s been quite some time since I’ve had a need to plug in my trusty USB floppy ...
Loading...