Why Shared Fate is a Better Way to Manage Cloud Risk
The shared responsibility model was good enough to cover the first years of the cloud revolution, but the model is showing its limitations. Shared fate is a more mature model for the future of cloud security.
September 15, 2023
Professional Sports: The Next Frontier of Cybersecurity?
Sports teams, major leagues, global sporting associations, and entertainment venues are all home to valuable personal and business data. Here's how to keep them safe.
September 14, 2023
Security for Multicloud and Hybrid Cloud Environments
In multicloud environments, security challenges are most common at the connecting points between different clouds. Internal cloud security skill sets and cloud-native security tools are also key.
September 07, 2023
Overcoming Open Source Vulnerabilities in the Software Supply Chain
By securing access to code and running scans against all code changes, developers can better prevent — and detect — potential risks and vulnerabilities.
September 06, 2023
Considerations for Reducing Risk When Migrating to the Cloud
Proper planning is an essential part of reducing security and compliance risks before, during, and after a migration to a new cloud environment.
August 28, 2023
Iran and the Rise of Cyber-Enabled Influence Operations
Iranian threat actors are combining offensive network ops with messaging and amplification to manipulate targets' perceptions and behavior. Here are three examples.
August 16, 2023
Closing Coverage Gaps Where Customer Resources Meet Cloud Environments
Protecting the spaces where private, public, and hybrid clouds meet users' technologies requires a cloud-centric approach.
August 09, 2023
Unified XDR and SIEM Alleviate Security Alert Fatigue
By integrating detection response with information and event management, organizations can move beyond protective controls and harden their defenses.
August 02, 2023
Threat Intelligence Is Growing — Here's How SOCs Can Keep Up
By integrating XDR and SIEM, security professionals can automate correlation and prioritization of alerts across a broad swath of security infrastructure.
July 26, 2023
Leverage Threat Intelligence, AI, and Data at Scale to Boost Cyber Defenses
By combining these leading-edge tools, security professionals can amplify the impact of their security strategies.
July 19, 2023
6 Steps To Outsmart Business Email Compromise Scammers
Email fraud is a confidence game that costs the economy billions. An effective defense takes technology and vigilance.
July 06, 2023
3 Ways to Build a More Skilled Cybersecurity Workforce
With the right collaboration among employers, educators, and policymakers, we can come together to create a more secure environment for all.
June 30, 2023
3 Tips to Increase Hybrid and Multicloud Security
As cloud adoption grows, organizations need to rethink their approaches to securing hybrid cloud and multicloud environments.
June 29, 2023
How Infrastructure as Code Can Help Minimize Human Error
Infrastructure as code lets organizations manage cloud infrastructure with the same versioning, testing, and automation processes they use for application code.
June 26, 2023