Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloud

Fulfilling the promise of single-vendor SASE through network modernization

As more organizations collectively progress toward adopting a SASE architecture, it has become clear that the traditional SASE market definition (SSE + SD-WAN) is not enough. It forces some teams to work with multiple vendors to address their specific needs, introducing performance and security tradeoffs. More worrisome, it draws focus more to a checklist of services than a vendor’s underlying architecture.

KuppingerCole Names Sysdig a Product and Innovation Leader for CNAPP

The cloud security market is still maturing and growing at a rapid pace. New security jargon, solutions, vendors, and acronyms are constantly appearing, making it difficult to have a clear sense of what approach to cloud security is best for your own organization. Cloud-native application platforms (CNAPPs) are one of the most recent categories in this space.

Egnyte + Google Cloud

Secure sensitive data amid a frictionless collaboration experience with Egnyte and Google Cloud. Automate discovery, control and protection of data wherever work happens to simplify compliance and security processes. Protect data across multi- and hybrid cloud environments, reduce attack surfaces, and enact better data governance — all from a single control panel.

Introducing the SecOps Cloud Platform

Gone are the days of one-size-fits-all security solutions that do not adequately address the complexities of modern networks and evolving threats. These general-purpose tools lack the flexibility to adapt to your unique environment and specific needs. As a result, organizations end up with a fragmented collection of tools that need to be manually integrated and stitched together, leading to inefficiencies, gaps in security coverage, and extreme costs.

What is Azure Security? 7 Best Practices for Microsoft Azure Active Directory (AD)

Organizations are increasingly adopting cloud technologies, mainly to secure their sensitive data. But are these cloud infrastructures so secure? We all know that companies worldwide are challenged by the ongoing volume of evolving security threats and by retaining qualified professionals to respond to these threats. On average, large organizations get approximately 17,000 security alerts a week, and it takes 99 days to discover security breaches.

6 Box Alternatives to Help Secure Your Files Online

Being online can offer much freedom, and we are fortunate enough to have a wealth of resources to manage our lives online. Too many options can sometimes make us feel stuck in a box, and we look for alternatives that balance freedom and security. One such example of finding a solution to manage your online life is cloud storage. There are many options to consider, but many people will choose their preferred operating system cloud provider, sacrificing ease of use for the privacy of their data.

Friday Flows Episode 20: Regularly Update Insecure AWS EC2 Security Groups

Launching an AWS EC2 instance can be done in seconds, but are they being set up securely for success? In today's Friday Flows, Michael Tolan helps us celebrate the 700th Tines Story Library addition with a look at a customer submitted workflow to audit and remediate default security groups for virtual machines in AWS.

CSPM vs. CNAPP: Which Solution to Choose?

Protecting cloud-based applications and workloads requires robust security solutions such as CSPM, CIEM and CWPP. CNAPP tries to answer all 3 but how do you know which solution is right for your specific organization? Ava Chawla, AlgoSec’s Global Head of Cloud Security unravels the differences between them and shares her expert opinion on the solution that offers the most value for organizations.

CrowdStrike Defends Against Azure Cross-Tenant Synchronization Attacks

As Microsoft Azure continues to gain market share in the cloud infrastructure space, it has garnered attention from adversaries ranging from hacktivist and eCrime threat actors to nation-state adversaries. Recent attacks on Microsoft by cloud-focused threat actors like COZY BEAR are becoming more frequent and garnering huge attention.