Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Key learnings from the State of Cloud Security study

We recently released the State of Cloud Security study, where we analyzed the security posture of thousands of organizations using AWS, Azure, and Google Cloud. In particular, we found that: In this post, we provide key recommendations based on these findings, and we explain how you can leverage Datadog Cloud Security Management (CSM) to improve your security posture.

Nextcloud Review: Is Self-Hosting Your Cloud Storage Worth It?

Many people may be surprised that you can host your cloud storage straight from the comfort of your home. If you knew this was possible, you may wonder which is the best self-hosting solution for you, and chances are you may be considering Nextcloud. If that’s the case, congratulations, you’re in the right place! If not, congratulations anyway for considering an alternative cloud provider and switching to a private cloud storage solution.

The Six Pillars of Cybersecurity

In the ever-evolving landscape of cloud computing, ensuring robust security measures has never been more important. In the new ISO 27001:2022 standard, there is a new requirement for organisations to establish control of their Cloud services, which includes every flavor of cloud from Software as a Service (SaaS) to Platform as a Service (PaaS). Amazon Web Services (AWS) is a leading cloud services provider.

From Shadow to Guardian: The Journey of a Hacker-Turned Hero

In the ever-evolving landscape of cybersecurity, the line between the defenders and attackers often blurs, with skills transferable across both arenas. It’s a narrative not unfamiliar to many in the cybersecurity community: the journey from black hat to white hat, from outlaw to protector. In the 15th episode of Cato Networks’ Cyber Security Master Class, hosted by Etay Maor, Senior Director of Security Strategy, we had the privilege of witnessing such a transformative story unfold.

DevNext Workshop 2: Innovate More...Remediate Less with JFrog DevOps-Centric Security

Watch the recording of the second workshop in the JFrog DevNext series - JFrog Security. The live audience experienced a real-time, hands-on event to help them develop their skills with the JFrog platform and how to easily secure their software supply chain.

SEO Challenges: Tool Thefts, Short Lifespan, and Implementation Struggles || Razorthorn Security

Description: In the ever-evolving landscape of SEO, the operation is no longer as simple as it once was. It goes beyond just worrying about your own digital "house"; now, you must also consider the connected houses in the vast online neighborhood. Tool thefts add another layer of complexity to the SEO game, requiring constant vigilance to safeguard your digital toolkit.