logo
June 14, 2024 | Craig Riddell

Securing the Cloud: A Comprehensive Guide to Identity and Access Management

In the not-so-distant past, managing user identities and access controls was a relatively straightforward process. Organizations operated within the confines of their on-premises networks where users logged onto a single system to access the resources they needed. This well-defined perimeter...
March 3, 2023 | Farrah Gamboa

Securing Your Amazon S3 Buckets

Amazon Web Services (AWS) is the world’s largest cloud provider, with well over a million active users. The popularity of AWS makes it one of the biggest targets for cybercriminals — and one of the leading contributors to breaches is incorrectly configured Amazon S3 buckets. For example, an...
January 25, 2022 | Farrah Gamboa

Top 5 Azure AD Security Best Practices

Azure Active Directory holds the keys to your Microsoft 365 kingdom. Responsible for vital functions such as authentication and authorization, Azure AD is ultimately responsible for managing access across the Microsoft cloud ecosystem. For that reason, is the target of many...
January 13, 2022 | Elena Vodopyan

Cybersecurity: What to Expect in 2022

As the pandemic continues, organizations around the world are working hard to adapt to the "new normal." This article highlights the key trends that we will face in 2022 and beyond. Ransomware will be an even more devastating threat in 2022. Ransomware attacks more than doubled in 2021 compared...
November 3, 2021 | Dirk Schrader

Introduction to Cloud Hardening

Storing sensitive data in the cloud greatly expands your attack surface area — and adversaries are seizing the opportunities that cloud adoption presents. In fact, a 2022 Netwrix survey found a 10% increase in attacks targeted at cloud infrastructure. Handpicked related content: [Free...
December 1, 2020 | Jeff Melnick

Cloud Computing Security Tools: Choosing the Right Solutions

No matter where you host your data, there are always risks. The public cloud is no exception. While providers like Amazon, Microsoft and Google offer security features, ultimately, cloud security is your responsibility. Where do you start? This article explains the key elements of a strong...
November 12, 2020 | Mike Tierney

Common Cloud Computing Security Issues and How to Mitigate Them

Securing your cloud environment effectively is no easy task. What cloud security issues should you be prepared for? What are the most serious security risks? Which best practices are most effective at keeping your data safe? In this article, we will explore the two primary cloud models and the...
September 17, 2020 | Jeff Melnick

Hybrid Cloud Security

Hybrid cloud is an increasingly popular infrastructure option for companies in industries from game development to finance. But what is it, and what are the most effective hybrid cloud security practices for protecting your sensitive and regulated data? What is hybrid cloud? A hybrid cloud is a...
September 10, 2020 | Ryan Brooks

Cloud Challenges by the Numbers: Adoption and Configuration

The year 2020 has shown us that cloud computing is among the most powerful capabilities humanity has, enabling people around the globe continue their everyday business and education uninterrupted. We continue gathering the most interesting findings from industry research. If you’re interested in...
September 8, 2020 | Jeff Melnick

Top 6 Security Threats in Cloud Computing and How to Mitigate Them

In this digital era, more companies are encouraging or requiring employees to work from home. In addition to allowing employees to access the corporate network using their own devices, they are also turning to cloud computing, which is cost-effective and scales easily. However, not all of these...
Show more articles
...