Uptycs Lacework Palo Alto CNAPP cloud security misconfiguration multi-cloud security Cloudflare cloud disaster recovery DR security

Orgs Still Struggling With Cloud Security

A dozen years ago, when organizations were still in the early stages of adopting cloud computing, the biggest obstacle was security. SMBs especially didn’t seem to understand what the cloud was, and ...
Security Boulevard
Okta F5 Alkira zero-trust Secure Cloud AccessTeleport cloud incident response automation cloud security cloud data protection Oracle cloud security Bridgecrew misconfigurations Palo Alto Networks public cloud

Automation is the Top Cloud Security Priority

Two years of pandemic-forced remote work has shown how much organizations depend on cloud computing. Employees want to work at home, convinced they are more productive from a remote office than at ...
Security Boulevard
Lapsus$ Strikes Again—190GB Samsung Data Release by Nvidia Hackers

Lapsus$ Strikes Again—190GB Samsung Data Release by Nvidia Hackers

Samsung Electronics has confidential data stolen and leaked by ransomware scrotes—190 GB of it ...
Security Boulevard
Revealed: Daxin—‘China-Linked’ Advanced Stealth Backdoor

Revealed: Daxin—‘China-Linked’ Advanced Stealth Backdoor

Researchers unveil espionage malware from China: Daxin “is without doubt the most advanced piece of malware” they’ve seen from that country ...
Security Boulevard
application security cloud left integration Shifting DevSec Left with ShiftLeft

Shifting Cloud Security Left

What is shift left security? The concept of shifting left comes from the four stages of the software development life cycle (SDLC): Develop, build, test and deploy. Developers are at the far ...
Security Boulevard
Cisco critical infrastructure Ivanti

How Critical Infrastructure Providers Can Securely Connect OT to the Cloud

Cloud connectivity offers tremendous benefits for critical infrastructure operators. Sending data from operational technology (OT) devices to the cloud opens the door for asset owners to use remote diagnostic and analysis tools, ...
Security Boulevard
Uptycs Lacework Palo Alto CNAPP cloud security misconfiguration multi-cloud security Cloudflare cloud disaster recovery DR security

Multi-Cloud Security in 2022

As we kick off 2022, it is a good time to think about what the next year will mean for the security industry. This next year is a critical time for our ...
Security Boulevard
Crypto Mining Hackers vs. Cloud Computing—Google States the Obvious

Crypto Mining Hackers vs. Cloud Computing—Google States the Obvious

Google’s new Cybersecurity Action Team (CAT) would like you to know that insecure cloud instances can be hijacked by hackers. Stop the press. Did we really need to be told that? ...
Security Boulevard
CHIPS US U.S. State digital national security cybersecurity executive order Cyber Strategy

A Cyber Executive Order For the 21st Century

The long-expected Executive Order On Improving the Nation’s Cybersecurity was published Wednesday, May 12, 2021. My initial reaction is positive. It calls for using multifactor authentication and encryption within Federal agencies after ...
Security Boulevard
Loading...