Cloud Security
Legacy AppSec Tools Getting Lost in the Cloud
As the pace of application development accelerates, IT and security teams are losing faith in old application security (AppSec) tools. Legacy tools can’t keep up and are stuck in a perpetual game ...
Making a Case for Single-Vendor SASE
Thanks to a workforce that is increasingly operating remotely and accessing applications that reside outside the corporate perimeter (i.e. cloud), businesses are lacking a scalable and secure architecture that is built around ...
Why Approaching Cloud Security Outside-In Is Insufficient for Enterprise
Reading Time: 4 minutes One of the most common security management objectives we hear every day in our advisory work at TAG Cyber involves enterprise teams trying to prevent malicious attackers from ...
Discover Dangling Domains that point to your cloud assets to prevent subdomain takeover
Dangling domains are DNS records that point to a domain or subdomain that no longer exists or is not configured properly. It occurs when a domain or subdomain has been deleted, but ...
The Shared Responsibility Model in the Cloud
Reading Time: 6 minutes The Shared Responsibility Model in the Cloud Gartner predicts that through 2025, 99% of all cloud security failures will be the customer’s fault. A statistic like this can ...
Comparing Cloud Providers’ Shared Responsibility Models
More and more enterprises are becoming multi-cloud. And when evaluating cloud service providers (CSPs) for different needs, one important factor is security. Yet, CSPs aren’t responsible for securing everything—depending on the component ...
Aviatrix Distributed Cloud Firewall Streamlines App Security
Aviatrix today made generally available a Distributed Cloud Firewall (DCF) that programmatically pushes and enforces cybersecurity policies for cloud computing environments via a central console. Rod Stuhlmuller, vice president of solutions marketing ...
Webinar Recap: SOC2 in the Cloud for SaaS Companies
Lightspin recently teamed up with KirkpatrickPrice to discuss best practices in achieving SOC2 compliance. Here are some of the key takeaways from our joint webinar. ...
Common K-12 Data Security Issues and How to Solve Them
Big data can be a big problem. Why? Well, it’s a matter of volume and velocity. You see, the average person creates 1.7 MB of data per second. That’s over 146,000 MB ...
A Comprehensive Guide to K-12 Cybersecurity and Safety
Whether they take the form of a targeted attack or an accidental leak, cyber incidents are a major threat to the U.S. school system. From public school districts to higher education and ...