cloud security

Cloud Security Myth vs. Fact #2: Is Encryption the Best Security for Data at Risk?

| | Cloud Security
Whenever there’s a major data breach one of the first things everyone asks is, “Was the data encrypted?” This is a very natural question to ask because since the 1970s encryption has ...
cloud

Am I Already Using the Cloud and is it Safe?

Often when speaking to people about the cloud, their first reaction is that it isn’t safe and they won’t use it. Odds are that they, and most everyone else who owns an ...

The Top 3 Open Source Tools for AWS Incident Response

The post The Top 3 Open Source Tools for AWS Incident Response appeared first on Delta Risk ...
4 DMZ Best Practices to Shield You From Attackers

4 DMZ Best Practices to Shield You From Attackers

In the cloud era, the DMZ has become more important – and more vulnerable – than its original architects ever thought possible ...
Barracuda Networks Extends WAF Reach to Google Cloud Platform

Barracuda Networks Extends WAF Reach to Google Cloud Platform

Barracuda Networks has made its web application firewall (WAF) available on the Google Cloud Platform (GCP). Tim Jefferson, vice president of public cloud for Barracuda Networks, said the availability of CloudGen WAF ...
Security Boulevard
Mitigating Risks of Shadow IT

Mitigating Risks of Shadow IT with CASBs

According to the RightScale “2018 State of the Cloud Report,” 81 percent of companies are now using the cloud, an indication that it has more than delivered on its promises of efficiency, ...
Security Boulevard
Identity Security Solution

Identity Security Solution

Did you know the number one cause of companies being breached today is the compromise of identities? It’s true, and what’s more, identity compromise is first by a country mile: 81% of ...
cloud security

Cloud Security Myth vs. Fact #1: My Provider Protects My Data

If you’re in the process of creating a security strategy for your cloud deployments, then you understand the complexities that exist. The challenges presented by compliance, data governance, and emerging technology can ...
Loading...