Everything you need to know to become a cloud security engineer | Digit | November 14, 2020 |
Definition: software-defined perimeter (SDP) | SearchCloudSecurity | November 13, 2020 |
How to Keep Multicloud Environments Secure | BizTech Magazine | November 13, 2020 |
Cloud Security Alliance Releases Key Management In Cloud Services: Understanding Encryption’s Desired Outcomes And Limitations | AIthority | November 10, 2020 |
Top Risk Factors Associated With Modern Cloud Security Frameworks | AIthority | November 10, 2020 |
A Zero Trust Approach to Protecting Cloud Identities Begins with Least Privilege | Security Boulevard | November 09, 2020 |
Cloud Computing: Why It Has Achieved Widespread Popularity | Irish Tech News | November 04, 2020 |
CSA Moves to Redefine Cloud-Based Intelligence | Dark Reading | November 04, 2020 |
CNAs and CVEs – Can allowing vendors to assign their own vulnerability IDs actually hinder security? | The Daily Swig | November 03, 2020 |
5 Steps to Proactively Address Unauthorized IT in the Office | BizTech Magazine | November 03, 2020 |
CSA Dives Deep Into 'Egregious' Cloud Computing Threats | CyberWire | November 03, 2020 |
Zero trust in hybrid environments | GCN.com | November 02, 2020 |
CSA Dives Deep Into 'Egregious' Cloud Computing Threats | ADT Magazine | November 02, 2020 |
Understanding the zero trust-SDP relationship | TechTarget | October 29, 2020 |
Q&A: Sam Houston State University cyber forensics intelligence expert talks foreign election hacking ahead of Nov. 3 | Community Impact Newspaper | October 29, 2020 |
14 controls for securing SAP systems in the cloud | CSO Online | October 29, 2020 |
Barracuda eyes Indochina markets | Computer Weekly | October 28, 2020 |
Choosing ZTNA vendors amid zero-trust confusion | TechTarget | October 27, 2020 |
Malicious SharePoint and OneDrive links are a phishing scammer’s dream | SC Magazine | October 22, 2020 |
Moving to the cloud with a security-first, zero trust approach | Help Net Security | October 21, 2020 |