ChaptersEventsBlog
Join global cybersecurity leaders shaping the future of AI security! Share your insights on AI Safety in this Deloitte executive survey

Announcements

Announcements
Definition: software-defined perimeter (SDP)
Definition: software-defined perimeter (SDP)

SearchCloudSecurity

November 13, 2020

How to Keep Multicloud Environments Secure
How to Keep Multicloud Environments Secure

BizTech Magazine

November 13, 2020

Cloud Security Alliance Releases Key Management In Cloud Services: Understanding Encryption’s Desired Outcomes And Limitations
Cloud Security Alliance Releases Key Management In Cloud Services: Understanding Encryption’s Desired Outcomes And Limitations

AIthority

November 10, 2020

Top Risk Factors Associated With Modern Cloud Security Frameworks
Top Risk Factors Associated With Modern Cloud Security Frameworks

AIthority

November 10, 2020

A Zero Trust Approach to Protecting Cloud Identities Begins with Least Privilege
A Zero Trust Approach to Protecting Cloud Identities Begins with Least Privilege

Security Boulevard

November 9, 2020

Cloud Computing: Why It Has Achieved Widespread Popularity
Cloud Computing: Why It Has Achieved Widespread Popularity

Irish Tech News

November 4, 2020

CSA Moves to Redefine Cloud-Based Intelligence
CSA Moves to Redefine Cloud-Based Intelligence

Dark Reading

November 4, 2020

CNAs and CVEs – Can allowing vendors to assign their own vulnerability IDs actually hinder security?
CNAs and CVEs – Can allowing vendors to assign their own vulnerability IDs actually hinder security?

The Daily Swig

November 3, 2020

5 Steps to Proactively Address Unauthorized IT in the Office
5 Steps to Proactively Address Unauthorized IT in the Office

BizTech Magazine

November 3, 2020

CSA Dives Deep Into 'Egregious' Cloud Computing Threats
CSA Dives Deep Into 'Egregious' Cloud Computing Threats

CyberWire

November 3, 2020

Zero trust in hybrid environments
Zero trust in hybrid environments

GCN.com

November 2, 2020

CSA Dives Deep Into 'Egregious' Cloud Computing Threats
CSA Dives Deep Into 'Egregious' Cloud Computing Threats

ADT Magazine

November 2, 2020

Understanding the zero trust-SDP relationship
Understanding the zero trust-SDP relationship

TechTarget

October 29, 2020

Q&A: Sam Houston State University cyber forensics intelligence expert talks foreign election hacking ahead of Nov. 3
Q&A: Sam Houston State University cyber forensics intelligence expert talks foreign election hacking ahead of Nov. 3

Community Impact Newspaper

October 29, 2020

14 controls for securing SAP systems in the cloud
14 controls for securing SAP systems in the cloud

CSO Online

October 29, 2020

Barracuda eyes Indochina markets
Barracuda eyes Indochina markets

Computer Weekly

October 28, 2020

Choosing ZTNA vendors amid zero-trust confusion
Choosing ZTNA vendors amid zero-trust confusion

TechTarget

October 27, 2020

Malicious SharePoint and OneDrive links are a phishing scammer’s dream
Malicious SharePoint and OneDrive links are a phishing scammer’s dream

SC Magazine

October 22, 2020

Moving to the cloud with a security-first, zero trust approach
Moving to the cloud with a security-first, zero trust approach

Help Net Security

October 21, 2020

It's Time To Move To The Cloud: Why The Benefits Outweigh The Risks
It's Time To Move To The Cloud: Why The Benefits Outweigh The Risks

Forbes

October 21, 2020