Cloud Security

Cloud Security

A New Approach to Modern Enterprise Access Management

A New Approach to Modern Enterprise Access Management

Earlier this week, we publicly announced the acquisition of Onion ID—a San Francisco-based identity and privileged access management (PAM) company. The acquisition marks a significant milestone in Thycotic’s strategic direction as a ...

Understanding Azure AD’s Premium P2 Tier

| | azure
Before purchasing a subscription to Azure’s top pricing tier, it’s important to understand what benefits and drawbacks AAD Premium P2 offers. The post Understanding Azure AD’s Premium P2 Tier appeared first on ...
Newspaper Icon with News Title - Red Arrow on a Grey Background. Mass Media Concept.

Bitglass Security Spotlight: Wishbone App Breached, Affecting More Than 40 Million Users

Here are the top stories of recent weeks: Over 40 Million Users Affected in Wishbone App Breach 25 Million College Students Are the Victims of Mathway Breach Airline Data Breach Results in ...
CipherCloud ChalkTalk - UEBA & Adaptive Access Controls

Five Step UEBA to Detect and Stop Insider Attacks

By Ishani Sircar, Manager, Product Marketing at CipherCloud Every year, more than 34% of businesses worldwide are affected by insider threats. (Source: Sisa Infosec) Despite various investments in security, most organizations are ...

Addressing emerging PAM use cases to protect access to SaaS applications, cloud infrastructure, and databases

With most of the global, white-collar workforce suddenly shifting to working remotely, cloud technology has emerged as a critical component to keep businesses up and running. These services are enabling people to ...
Encryption = Privacy ≠ Security

Encryption = Privacy ≠ Security

For the past few years, many have been talking about the changing “threat landscape” as it pertains to the increase in zero day, insider and phishing threats. While all of these threats ...
Zoom

Zoom’s New Model is Making Heads Hurt

Zoom will be introducing end-to-end encryption. But if you were expecting it in the free tier, think again ...
Security Boulevard

Microsoft Leans on Intel to power Azure Confidential Computing

Intel is a sponsor of TechSpective Data is the fuel that drives business, which is why it’s also a primary target. Protecting data has always been a challenge, but cloud computing, containers, ...
businessman hand working with modern technology and digital layer effect as business strategy concept-1

How to Choose the Right Cloud Access Security Broker

Legacy security technology is not designed to secure data as it moves beyond the perimeter and into a variety of cloud apps and devices. While leading cloud access security brokers are up ...
cloud security

Cloud Security Tips for Distributed Companies

As companies adjust to the new normal during this COVID-19 pandemic crisis, it’s business as usual for cyber attackers. They’re still probing for vulnerabilities to exploit, and the rapid transition to a ...
Security Boulevard