IaaS
Configuración segura en la nube – Explicación de IaaS, PaaS y SaaS
Si le preguntara qué productos de seguridad tenía para administrar el riesgo dentro de su organización de TI hace 10 años, probablemente enumeraría media docena de herramientas diferentes y confianza mencionar que ...
Introducing the Cloud Sensor for GCP
By Vijit Nair, Sr. Director, Product Management, Corelight Visibility is paramount in securing your cloud environment – as the adage goes, you cannot protect what you do not see. However, comprehensive visibility ...
NDR for AWS Well-Architected
By Roger Cheeks, US-East Sales Engineer, Corelight Corelight is a powerful network traffic analysis tool that enables network detection and response (NDR) for AWS Cloud workloads by receiving packets from an AWS ...
Gartner: 5 Things You Must Absolutely Get Right for Secure IaaS and PaaS
Cloud adoption has revolutionized the way that businesses share and access information. It has stretched across all industries, including those that are regulated or highly security conscious. Today, infrastructure-as-a-service (IaaS) and platform-as-a-service ...
Bitglass Security Spotlight: 6.5 Million Registered Voters Exposed in Israel, Three Weeks Before the Election
Here are the top stories of recent weeks: Over 6.5 Million Israeli Voters Exposed in Online Voter Registry Phishing Scam Costs Puerto Rican Government Over $2.6 Million Nedbank, South Africa’s Predominant Bank ...
Malware in the Cloud: Protecting Yourself Based on Your Cloud Environment
In some ways, the cloud has made security management easier, as many cloud providers have taken the responsibilities traditionally associated with local server management out of your hands. But in other ways, ...
Bitglass Security Spotlight: Cancer Centers Halted Due to Cyberattack
Here are the top stories of recent weeks: Ransomware Attack Halts Two Cancer Radiation Treatment Centers Cloud Based Storage Bucket Exposed with Over 750,000 Users’ Applications A Massive Trove of Email Addresses ...
Security for Cloud Services: IaaS Deep Dive
In this, the final post in my series on considerations for managing your security with cloud services, we will be looking at Infrastructure as a Service (IaaS). If you haven’t yet read ...
Appeasing the Oasis of Unknown: Shadow IT Discovery
In a sea of millions of apps, which one is the biggest fish to fry? Firewall and proxy logs catch the traffic of users, but identifying what needs attention in such comprehensive ...
Secure Configuration in Cloud – IaaS, PaaS and SaaS Explained
If I asked you what security products you had in place to manage your risk within your IT organisation 10 years ago, you’d probably have been able to list a half dozen ...

