Introducing Cloud App Isolation

Manage Shadow IT and Stop Data Loss Through Cloud Apps Cloud Apps Are a Point of Attack Protecting workers is a challenging task—for example, 29 percent of all attacks leverage legitimate cloud ...
COVID-19 cybersecurity

The Coronavirus Pandemic and the Death of the VPN

Is the onslaught of remote workers as a result of COVID-19 what finally brings VPN technology to its end? The software-as-a-service (SaaS) cloud application boom has fundamentally transformed how businesses operate. Virtually ...
Security Boulevard
Webroot

Top 5 Open Source Serverless Security Tools

Here are some useful open source serverless security tools to help you secure your apps The growing popularity of serverless architecture has led to its massive adoption. My organization has jumped on ...
Security Boulevard
Exabeam

Assessing the Cloud’s Impact on Business Security

Proliferation of cloud services has  sparked a revolution in IT and how technology is consumed. There has never been a time when we had more capabilities at our fingertips than we do ...
Security Boulevard
Orca Security Cloud Security Funding

Orca Security Picks Up $6.5M to Improve Cloud Security

Orca Security has picked up an additional $6.5 million in funding to further development of an analytics platform that provides visibility into cloud applications and infrastructure without requiring organizations to deploy agent ...
Security Boulevard
Orca Security Cloud Security Funding

Take Back Control of Your Apps and Data With Cloud Monitoring

Insider threats come in many forms, including disgruntled employees with malicious intent and unassuming workers who inadvertently mishandle and leak sensitive data or peak at a co-worker’s private information. Ponemon’s 2018 Cost ...
Security Boulevard