Cloud Security

Cloud Security

AWS Security Monitoring Checklist — Part 2

| | cloud computing
In Part One, we covered some important security configurations checklists relating to AWS objects such as S3, IAM and Cloudtrail. In this installment, we will continue exploring more configurations... Go on to ...
Unified Access Management for Windows

Unified Access Management for Windows

There’s a new term that identity management vendors are throwing around. It’s called unified access management. Unfortunately, thus far, the term has been mainly used to reference centralized access to web and ...
Security Boulevard's 5 Most Read Stories for the Week, July 9-13

Security Boulevard’s 5 Most Read Stories for the Week, July 9-13

A new week, a new crop of security stories. Last week, Privacy in Public Places, Fileless Malware, Spam Bots and Fake Accounts and Cryptomining Worm MassMiner made headlines. Also, we offered some ...
Security Boulevard
Zero Trust Architecture

Zero Trust Architecture

The concept of a zero trust architecture in today’s IT environment is steadily gaining traction. Reports of security breaches are a near-everyday occurrence, so it only makes sense that IT admins would ...
Google Cloud Server Authentication

Google Cloud Server Authentication

Google Cloud Platform™ (GCP) has become a popular alternative to AWS® and Azure®. All three platforms have become quite successful, and IT organizations are shifting their server infrastructure to the cloud. The ...
AWS® Cloud Directory vs Active Directory®

AWS® Cloud Directory vs Active Directory®

Amazon has recently introduced a new service on its AWS® platform, called Cloud Directory. Because of its name, many IT organizations immediately jump to the conclusion that it is a replacement for ...
Mitigating Risks of Shadow IT

Mitigating Risks of Shadow IT with CASBs

According to the RightScale “2018 State of the Cloud Report,” 81 percent of companies are now using the cloud, an indication that it has more than delivered on its promises of efficiency, ...
Security Boulevard
What is an Identity Cloud?

What is an Identity Cloud?

A new term is being thrown around in the IT management world—identity cloud. But, what is an identity cloud, and how can it help you and your organization? With the advent of ...
Identity Security Solution

Identity Security Solution

Did you know the number one cause of companies being breached today is the compromise of identities? It’s true, and what’s more, identity compromise is first by a country mile: 81% of ...
CISO Roundtable

First Annual Long Island CISO Roundtable

Two weeks ago CCSI held its first annual CISO Roundtable to discuss cybersecurity trends, issues and solutions. The conversation was focused on how local CISO’s are currently handling security from an executive ...
Loading...