Cloud Security - Tagged - Security Boulevard
How to Close the Gaps in Your Security Investigations With Network Telemetry

Not the Final Answer on NDR in the Cloud …

Not the Final Answer on NDR in the Cloud …Back in my analyst years, I rather liked the concept of NDR or Network Detection and Response. And, despite having invented the acronym EDR, ...
SaaS and BYOD Malware or ATP

Malware in the Cloud: Odds Are You’re Infected

Malware attacks increased by 358% in 2020, while ransomware attacks, in particular, increased by 435%. Additionally, malware is targeting cloud apps more than ever before, and, at any given moment, 44% of ...
Anyone For a Smart Network Slice?

Anyone For a Smart Network Slice?

As with any standardization effort, development of 5G specifications accounted for numerous technology trends and new use cases. Network functions were designed for virtualization and automation to enhance operational efficiency and agility ...
Leading Multinational Bank Implements Cloud Strategy with Sonrai Dig

Leading Multinational Bank Implements Cloud Strategy with Sonrai Dig

Financial service organizations, such as FinTech startups, online payment platforms, or global banks have to modernize and transform to meet […] The post Leading Multinational Bank Implements Cloud Strategy with Sonrai Dig ...
Screen Shot 2021-04-26 at 1.39.00 PM.jpg

Observed Changes to the Threat Landscape in 2020

Reflecting on the cybersecurity threat landscape in 2020, we can't overlook the massive changes that landed on us. Global security attacks increased at a significant pace between 2019 and 2020, and the ...

The Multi-Layered K-12 Cybersecurity Tech Stack

Episode 9: The Multi-Layered K-12 Cybersecurity Tech Stack School districts have shifted further into the cloud with the increased adoption of Google Workspace and Microsoft 365 cloud applications. Bringing in more applications ...

Creating Cloud Security Policies that Work

Now that the ongoing worldwide trend toward “going digital” has been accelerated by COVID-19, taking extra precautions to protect your organization’s data, communications and information assets is more important than ever. Of ...
Fidelis Detects Adversary Tactics & Techniques Early and Often Across All Stages of the Attack Lifecycle in MITRE Engenuity’s 2020 ATT&CK® Evaluation

Fidelis Detects Adversary Tactics & Techniques Early and Often Across All Stages of the Attack Lifecycle in MITRE Engenuity’s 2020 ATT&CK® Evaluation

The post Fidelis Detects Adversary Tactics & Techniques Early and Often Across All Stages of the Attack Lifecycle in MITRE Engenuity’s 2020 ATT&CK® Evaluation appeared first on Fidelis Cybersecurity ...
close up of a puzzle game parts-1

Better Together: The Future of CASBs and SWGs

We’ve established before that cloud access security brokers (CASBs) and secure web gateways (SWGs) do not compete and are, in fact, complementary security tools. However, in addition to this, there is overlap ...
image 1 graph.jpeg

Don’t Risk Getting Caught by Kr3pto Phishing Kits

Akamai's threat research team recently published a report showing that a new phishing toolkit named Kr3pto was targeting UK banking customers. A phishing kit is an all-in-one software package that lets just ...