Cloud
6 Tips for Understanding 3rd-Party Risk in the Cloud
Most organizations are unaware of the security risk that third parties pose to their cloud infrastructure and the importance of managing their permissions. The post 6 Tips for Understanding 3rd-Party Risk in ...
Misconfigurations of Cloud-Managed Infrastructures Continue to be a Major Challenge to Data Security
In case you missed the memo, cloud-hosted data is here to stay. Recent data shows spending on cloud services reached a total of $178 billion in 2021, a 37 percent increase over ...
How to Improve Your Incident Response in the Cloud
A look at the security best practices and mindset to adopt to better detect and recover from malicious activity in your cloud infrastructure The post How to Improve Your Incident Response in ...
DRaaS Leads Companies Into the World of Cloud
As more and more large enterprises adopt cloud technologies, there are still many small- and medium-sized companies that have yet to take that leap. There are economic incentives that make the movement ...
What You Should Know about the New OpenSSL Vulnerability
Find out how to detect which OpenSSL version you’re running and if your organization is exposed to the critical OpenSSL vulnerability - and what to do about it. The post What You ...
IBM Cost of a Data Breach 2022 – Highlights for Cloud Security Professionals
Learn from the 2022 IBM cost of a data breach report how much ransomware, credential and other breaches are impacting the budget. The post IBM Cost of a Data Breach 2022 – ...
Verizon’s 2022 Data Breach Report – Insights for Cloud Security Professionals
Wondering which cyber attacker trends are putting your organization at risk? Learn about the leading threat vectors – and how cloud security solutions can help. The post Verizon’s 2022 Data Breach Report ...
Today’s Threats, Tomorrow’s Skill Sets?
Being aware of emerging threats and how they impact technologies is key to bolstering defenses. But can this knowledge also prove useful to your career? Today, the top skill sets employers are ...
Cyber Security DE:CODED – Ransomware
“There’s usually about 30% corruption in backups” Show notes for series 2, episode 5 Ransomware is feared by businesses all over the world. What happens during and after an attack? We give ...
Five Lessons Every Cybersecurity Team Can Learn from the Uber Incident
Upon hearing of a cyber security incident, alleged or factual, the most productive thing to do is learn what you can from its main lessons The post Five Lessons Every Cybersecurity Team ...