logo
June 10, 2025 | Jeff Warren

Cloud Security Monitoring

Cloud security monitoring provides real-time visibility, threat detection, and automated response across cloud environments. It aggregates logs, detects anomalies, enforces compliance, and supports incident response. Tools integrate with SIEM, IAM, and SOAR to reduce MTTD/MTTR, protect sensitive...
June 14, 2024 | Craig Riddell

Securing the Cloud: A Comprehensive Guide to Identity and Access Management

In the not-so-distant past, managing user identities and access controls was a relatively straightforward process. Organizations operated within the confines of their on-premises networks where users logged onto a single system to access the resources they needed. This well-defined perimeter...
March 3, 2023 | Farrah Gamboa

Securing Your Amazon S3 Buckets

Amazon Web Services (AWS) is the world’s largest cloud provider, with well over a million active users. The popularity of AWS makes it one of the biggest targets for cybercriminals — and one of the leading contributors to breaches is incorrectly configured Amazon S3 buckets. For example, an...
January 25, 2022 | Farrah Gamboa

Top 5 Azure AD Security Best Practices

Azure Active Directory holds the keys to your Microsoft 365 kingdom. Responsible for vital functions such as authentication and authorization, Azure AD is ultimately responsible for managing access across the Microsoft cloud ecosystem. For that reason, is the target of many...
January 13, 2022 | Dirk Schrader

Cybersecurity: What to Expect in 2022

As the pandemic continues, organizations around the world are working hard to adapt to the "new normal." This article highlights the key trends that we will face in 2022 and beyond. Ransomware will be an even more devastating threat in 2022. Ransomware attacks more than doubled in 2021 compared...
November 3, 2021 | Dirk Schrader

Introduction to Cloud Hardening

Storing sensitive data in the cloud greatly expands your attack surface area — and adversaries are seizing the opportunities that cloud adoption presents. In fact, a 2022 Netwrix survey found a 10% increase in attacks targeted at cloud infrastructure. Handpicked related content: [Free...
December 1, 2020 | Paul Stephens

Cloud Computing Security Tools: Choosing the Right Solutions

Cloud Computing Security Tools help organizations protect sensitive data, applications, and infrastructure in hybrid and public cloud environments. Effective strategies include data governance, classification, DLP, encryption, and backup, combined with multi-factor authentication, CASBs, and user...
November 12, 2020 | Mike Tierney

Common Cloud Computing Security Issues and How to Mitigate Them

Securing your cloud environment effectively is no easy task. What cloud security issues should you be prepared for? What are the most serious security risks? Which best practices are most effective at keeping your data safe? In this article, we will explore the two primary cloud models and the...
September 17, 2020 | Paul Stephens

Hybrid Cloud Security

Hybrid cloud combines public and private environments to balance flexibility, scalability, and security, but it introduces risks such as misconfigurations, unclear responsibility, and compliance challenges. Protecting hybrid infrastructures requires strong identity and access management,...
September 10, 2020 | Dirk Schrader

Cloud Challenges by the Numbers: Adoption and Configuration

Cloud adoption continues to accelerate, but poor planning leads to overspending, readiness gaps, and misconfigurations that expose sensitive data. Traditional security tools often fail in cloud environments, requiring strategies focused on data classification, encryption, access controls, and...
Show more articles
...