cloud applications
F5 Networks Extends AWS Alliance to Address CDN Security
F5 Networks this week announced the integration of F5 Essential App Protect, a software-as-a-service (SaaS) platform for protecting web applications, and Amazon CloudFront, a content delivery network (CDN) service from Amazon Web ...
CSA Report Surfaces Cloud Attack Patterns
The Cloud Security Alliance (CSA) this week published a free report intended to make it easier for cybersecurity teams to recognize and thwart the most 11 egregious threats to cloud computing environments ...
Cloud Security Challenges in the Next Phase of WFH
As remote work becomes the new normal, organizations must address their cloud security to protect their data and employees Many organizations have been operating with a newly expanded remote workforce for several ...
Introducing Cloud App Isolation
Manage Shadow IT and Stop Data Loss Through Cloud Apps Cloud Apps Are a Point of Attack Protecting workers is a challenging task—for example, 29 percent of all attacks leverage legitimate cloud ...
The Coronavirus Pandemic and the Death of the VPN
Is the onslaught of remote workers as a result of COVID-19 what finally brings VPN technology to its end? The software-as-a-service (SaaS) cloud application boom has fundamentally transformed how businesses operate. Virtually ...
Top 5 Open Source Serverless Security Tools
Here are some useful open source serverless security tools to help you secure your apps The growing popularity of serverless architecture has led to its massive adoption. My organization has jumped on ...
Assessing the Cloud’s Impact on Business Security
Proliferation of cloud services has sparked a revolution in IT and how technology is consumed. There has never been a time when we had more capabilities at our fingertips than we do ...
Orca Security Picks Up $6.5M to Improve Cloud Security
Orca Security has picked up an additional $6.5 million in funding to further development of an analytics platform that provides visibility into cloud applications and infrastructure without requiring organizations to deploy agent ...
Take Back Control of Your Apps and Data With Cloud Monitoring
Insider threats come in many forms, including disgruntled employees with malicious intent and unassuming workers who inadvertently mishandle and leak sensitive data or peak at a co-worker’s private information. Ponemon’s 2018 Cost ...

