Balancing Security, Innovation, and Who's Liable for Security Flaws
Blog Published: 06/30/2023
Originally published by Dazz. Written by Julie O’Brien, CMO, Dazz. The recent Wall Street Journal article, “Should Software Companies Be Held Liable for Security Flaws?” shared differing points of view from the former U.S. National Cyber Director and the vice president of the Information...
Cloud Security: What It Is and How to Implement It to Secure Data, Applications, and Infrastructure
Blog Published: 07/05/2023
Written by Genesio Di Sabatino, Head of Cloud Security, Swascan. The increasing migration of data, applications and infrastructure to new technological environments poses cybersecurity challenges in completely unexplored contexts where cloud security plays a leading role. Here's everything you...
I’ve Just Bought Zero Trust, Now What?
Blog Published: 07/06/2023
Originally published by CXO REvolutionaries. Written by Brett James, Director, Transformation Strategy, Zscaler. What does “buying zero trust” even mean? You’ve bought into the modern security concepts that governments and industry bodies have been promoting? You’ve received funding and resour...
White House National Cybersecurity Strategy – Key Takeaways
Blog Published: 07/07/2023
Originally published by DigiCert. Written by Mike Nelson. Earlier this month, the White House released their National Cybersecurity Strategy, demonstrating a heightened focus in the highest levels of government on securing our digital interactions, which, as we’ve seen with recent attacks on c...
Third-Party App Integration Permissions: What You Need to Know
Blog Published: 07/05/2023
Originally published by Abnormal Security. Written by Ryan Schwartz. On average, enterprise organizations have roughly 300 third-party applications integrated into their cloud environment, according to our Knowledge Base data. It isn’t surprising either as there are apps for every imaginable b...
State of Cloud Data Security Report Reveals Increase in Cloud Data Breaches: Shadow Data Concerns
Blog Published: 07/05/2023
Originally published by Laminar. Written by Andy Smith, Chief Marketing Officer, Laminar. Cloud transformation and data democratization provide a number of benefits to organizations, but these same technologies and trends are also introducing the greatest risks.We are in the midst of cloud dat...
Security Guidance from the Front Lines of Cloud Incident Response
Blog Published: 07/07/2023
Originally published by CrowdStrike on June 15, 2023. In our first-ever Cloud Threat Summit, CrowdStrike’s Senior Vice President of Intelligence and Senior Director of Consulting Services discussed the most common ways adversaries breach the cloud and the steps organizations can take to stay s...
Balancing Trust and Security for Business Resilience
Blog Published: 07/11/2023
How global organizations can mitigate insider threats in a hybrid work environment Written by Syam Thommandru, Vice President and Global Head – Strategic Alliances, Product Management, Business Partnerships, Cybersecurity & GRC Services, HCLTech and Anirudh Rautela, Director, Head of Cyber...
TechStrong PulseMeter Report: 47% of Organizations Have Limited Awareness of Their Sensitive Data in the Cloud
Blog Published: 07/11/2023
Originally published by Orca Security. Written by Jason Silberman. Organizations are continuing full speed ahead in moving much of their sensitive data to the cloud. Cybersecurity Ventures predicted in 2020 that the total amount of data stored in the cloud will reach 100 zettabytes by 2025...
What Does it Mean to Be a Modern App?
Blog Published: 07/06/2023
Originally published by Strata.Written by Ben Robertson, Principal Solutions Architect, Strata Identity.There’s a common thought that if an application speaks industry-leading identity standards, it automatically makes it modern. However, the requirements of apps today go beyond that. How the ...
Positioning Your Cybersecurity Program for Success
Blog Published: 07/11/2023
Originally published by CAS Assurance. Increasing pressure for success It is not a secret that many organizations are increasing spending on cybersecurity. A research by Enterprise Strategic Group shows that 65% of organizations planned to increase cybersecurity spending in 2023. The research...
Proxyjacking Has Entered the Chat
Blog Published: 07/06/2023
Originally published by Sysdig. Written by Crystal Morin. Did you know that you can effortlessly make a small passive income by simply letting an application run on your home computers and mobile phones? It lets others (who pay a fee to a proxy service provider) borrow your Internet Protocol (...
Agents vs Agentless: Choosing the Right Security Approach for Your Specialized Cloud Virtual Machine Workloads
Blog Published: 07/13/2023
Originally published by Tenable. Written by John Tonello and Ryan Bragg. You can scan virtual machines for security vulnerabilities in multiple ways depending on what your instances are running, how long they’re up, and whether or not they can run an agent or be accessed with administrative ...
Implementing Least Privilege in AWS: Strategies for Minimizing Security Risks
Blog Published: 07/14/2023
Written by Abhishek Bansal, Founder, Autharva. Problem StatementIn the dynamic and ever-changing digital landscape, organizations find themselves in a perpetual battle against the looming specter of security breaches and unauthorized access to their most sensitive data. These risks have escal...
Managing Data Explosion with Software-Defined Storage (SDS)
Blog Published: 07/12/2023
Originally published by Sangfor. Written by Nicholas Tay Chee Seng, CTO, Sangfor Cloud. A New Era of Massive Data Generation The vast amount of data generated on a daily basis by industries and large organizations worldwide is growing at an outstanding rate. Statista forecasts that the total ...
The LastPass Breach is a Wake Up Call for Cloud Data Security
Blog Published: 07/07/2023
Originally published by Dig Security. Written by Ofir Shaty and Ofir Balassiano. For many LastPass employees – from software engineers to C-level executives – the last few months have been hell. Since December, the company has been embroiled in what’s shaping up to be a major data security sca...
White House Cyber Strategy: Leadership is Now Accountable
Blog Published: 07/10/2023
Originally published by Coalfire. Written by Jose Vasquez, Security Solutions Architect, Coalfire. The National Cybersecurity Strategy represents one of the most significant market-driving forces in the history of IT. It ushers in a new era of standards, requirements, and best practices that w...
Can You Have Too Much Security? How to Be in the "Goldilocks" Zone
Blog Published: 07/10/2023
Originally published by NCC Group. Written by Sourya Biswas, Technical Director, NCC Group. As cyber security consultants, we typically help clients determine where their cyber security gaps lie and how to bridge them. This can include detecting issues with respect to best practices and recomm...
What Automation Means For Cybersecurity—And Your Business
Blog Published: 07/10/2023
Originally published by Varonis. Written by Yaki Faitelson. In the movie Apollo 13, three astronauts returning to Earth are unaware of their perilous reentry. Back in Houston at Mission Control, chief flight director Gene Kranz (played by Ed Harris) comments on the unfortunate events, saying: ...
Why Businesses Struggle to Meet Compliance Requirements
Blog Published: 07/12/2023
Originally published by BARR Advisory. Written by Christine Falk. We recently sat down with Steve Ryan, manager of Attest Services, to discuss his thoughts on why businesses struggle to meet compliance requirements. Here’s what he had to say:Steve, why do you think it’s difficult for businesse...