newsSAP security holes raise questions about the rush to AICloud security firm Wiz has published a detailed report about SAP security holes, now patched, that raises alarming questions about the secondary role AI efforts are having on cybersecurity defenses.By Evan SchumanJul 18, 20245 minsCloud Security opinion Beware the tools that can bring risk to a Windows networkBy Susan BradleyJul 18, 20248 minsNetwork AdministratorWindows SecurityCloud Securitynews Baffle to offer tenant-level data encryption to AWS usersBy Shweta SharmaJul 17, 20243 minsEncryptionCloud Security newsGoogle eyes security startup Wiz for $23B in its largest-ever acquisitionBy Gyana Swain Jul 15, 20245 minsTechnology IndustryCloud Security featureSoftware supply chain still dangerous despite a slew of effortsBy Cynthia Brumfield Jul 10, 202410 minsCloud SecuritySecurity PracticesSupply Chain featureTop 12 cloud security certificationsBy Eric Frank Jun 28, 202414 minsCertificationsIT SkillsCloud Security newsOrca bolsters cloud security offering with source code supportBy Shweta Sharma Jun 26, 20243 minsCloud SecuritySecurity Software newsCloud security faces pressure from AI growth, multicloud useBy Maneesha Tiwari Jun 26, 20245 minsCloud Security newsTata Communications partners with Versa Networks on hosted SASEBy Lynn Greiner Jun 21, 20243 minsCloud SecurityNetwork Security Articleshow-toDownload our cloud security posture management (CSPM) buyer’s guideWith hybrid multicloud environments becoming prevalent across all industries, it pays to invest in the right cloud security posture management (CSPM) tools to minimize risk, protect cloud assets (apps and data), and manage compliance.By Linda Rosencrance Jun 20, 2024 1 minCloud SecurityEnterprise Buyer’s GuidesbrandpostSponsored by CrowdstrikeHow to achieve multi-cloud security at the speed of DevOps Modern cloud security requires a complete CNAPP with unified visibility and threat protection across the entire cloud estate to stop cloud breaches.By Paul Desmond Jun 20, 2024 4 minsCloud SecuritynewsHow AWS secures its infrastructure with SonarisWith Sonaris, an internally developed tool, AWS continuously monitors its systems to pre-empt attacks on customer data.By Shweta Sharma Jun 20, 2024 1 minCloud SecurityNetwork SecurityfeatureCCSP certification: Exam, cost, requirements, training, salaryThe Certified Cloud Security Professional (CCSP) is a cloud-focused security credential that can advance your career as a cybersecurity pro. Here are the details you need to know.By Josh Fruhlinger Jun 18, 2024 8 minsCertificationsIT SkillsCloud SecuritynewsMicrosoft president faces tough questions from Congress on China, securityMicrosoft president Brad Smith promised a renewed focus on security, a year after a major attack on the company’s Exchange email service attributed to a Chinese group.By John Leyden Jun 14, 2024 4 minsEmail SecurityCloud SecuritySecurityhow-toDownload our cloud access security broker (CASB) enterprise buyer’s guideEnterprises have untold numbers of endpoints, which can be on-premises or remote. Cloud access security brokers (CASBs) sit between those endpoints and cloud resources, providing essential visibility and management.By Neal Weinberg and David Strom Jun 13, 2024 1 minAccess ControlCloud SecurityEnterprise Buyer’s GuidesopinionA CISO game plan for cloud securityCISOs are still hampered by bad assumptions and outdated approaches. They should be involved in decisions from day 1 to address unique business needs.By David Linthicum Jun 13, 2024 1 minCloud SecuritynewsFortinet grabs cloud security player LaceworkFortinet will integrate Lacework's technology across its secure access service edge (SASE) and Security Fabric packages.By Michael Cooney Jun 11, 2024 1 minCloud SecuritynewsSnowflake: No breach, just compromised credentials, say researchersAfter weeks of speculation that Snowflake’s systems may have been hacked, cybersecurity researchers at Mandiant say it’s all down to compromised customer credentials.Snowflake is now considering making multifactor authentication mandatory to access its systems.By Paul Barker Jun 10, 2024 5 minsData BreachCloud SecuritynewsNew York Times plays down impact of source code leakBut the implications of the data breach go beyond the attackers being able to cheat at Wordle.By John Leyden Jun 10, 2024 4 minsData BreachCloud SecuritybrandpostSponsored by Palo Alto Networks Cloud security challenges are growing. Here’s why traditional SOC tools are failing to address them Charting the course of cloud security: Bridging the divide between legacy tools and evolving modern threats. Gain visibility today. By Gonen Fink, SVP Products, Cortex & Prisma Cloud, Palo Alto Networks Jun 05, 2024 5 minsCloud SecuritynewsMajor service tag security problems reported in Microsoft Azure Microsoft has opted not to fix the issue reported by Tenable Research, but many defend that decision, arguing that this should be decided by CISOs based on their environment.By Evan Schuman Jun 04, 2024 5 minsCloud SecuritySecurity PracticesVulnerabilities Show more Show less View all Resources whitepaper 4 steps to a risk-free cloud migration Cloud technologies, and cloud telephony specifically, have matured greatly—richer functionalities, stronger security, better uptime, and enhancements to user experiences. The post 4 steps to a risk-free cloud migration appeared first on Whitepaper Repository –. By RingCentral 22 Jul 2024Cloud ManagementCloud SecurityIT Operations whitepaper SANS CISO Primer: 4 Cyber Trends That Will Move the Needle in 2024 By SANS Institute 10 Jul 2024Cloud SecuritySecuritySecurity Practices whitepaper Attract, Hire, and Retain Mid-Level Cybersecurity Roles By SANS Institute 10 Jul 2024Cloud SecurityData and Information SecuritySecurity View all Video on demand videoHoneypots and the evolution of botnets | Salted Hash Ep 23Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm’s recent honeypot research, which gathered information showing how the bot landscape is evolving. Apr 20, 2018 12 minsAdvanced Persistent ThreatsFirewallsBackup and Recovery DJI’s bounty problems and video surveillance programs | Salted Hash Ep 13 Jan 08, 2018 21 minsData BreachHackingApplication Security Zero Trust networks and enterprise security strategy | Salted Hash Ep 12 Dec 18, 2017 26 minsCloud SecurityCloud ComputingSecurity The latest on Azure Stack, cyberattacks, the next iPhone and … keyboards Jul 20, 2017 41 minsAppleMicrosoftSmartphones See all videos Explore a topic Application Security Business Continuity Business Operations Careers Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news analysis Secure Boot no more? Leaked key, faulty practices put 900 PC/server models in jeopardy By Lucian Constantin Jul 26, 20247 mins Vulnerabilities news Counting the cost of CrowdStrike: the bug that bit billions By Shweta Sharma Jul 26, 20241 min Business ContinuityEndpoint Protection how-to Download the unified endpoint management (UEM) platform enterprise buyer’s guide By Bob Violino Jul 26, 20241 min Mobile SecurityEndpoint ProtectionEnterprise Buyer’s Guides podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) Jul 17, 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands Jul 08, 202418 mins CSO and CISO podcast CSO Executive Sessions: Data protection in Malaysia Jul 02, 202415 mins CSO and CISO video CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) Jul 17, 202417 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience Jul 10, 202424 mins CSO and CISO video CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands Jul 08, 202418 mins CSO and CISO