Eskenzi PR ad banner Eskenzi PR ad banner

Cloud Security

Read our Cloud Security News including features, how-tos, information, interviews and breaking news on the fast-growing industry. IT Security Guru is made up of a team of industry experts, providing daily news and insights into cloud security, cloud computing, exploits and vulnerabilities. For any queries relating to Cloud Security News, please contact our editorial team at [email protected]

Webinar: Secure Your Cloud Environment from Evolving Threats

The IT Security Guru has teamed up with Synopsys, a recognised leader in application security, to bring you the webinar, 'Secure Your Cloud Environment from Evolving Threats'. As the migration to the cloud continues at an unabated pace, the threats in the cloud are also increasing proportionally and evolving constantly. Data breaches, misconfiguration risks, weak identity and access management controls, insider threats, multi-cloud infrastructure, and increasing complexity are just a few of the many challenges...

Read more
Jack Lindsay IT Security Guru

There is often confusion between Cloud Access Security Brokers (CASB) and SaaS Security Posture Management (SSPM) solutions, as both are designed to address security issues within SaaS applications. CASBs protect sensitive data by implementing multiple security policy enforcements to safeguard critical data. For identifying and classifying sensitive information, like Personally Identifiable Information (PII), Intellectual Property (IP), and business records, CASBs definitely help. However, as the number of SaaS apps increase, the amount of misconfigurations and...

Read more

Of the 73% of security professionals with responsibility for the security of public cloud who operate in a multi-cloud environment, 98% think these more complex environments pose greater security challenges, a survey conducted for Tripwire by Dimensional Research reveals.   Organizations have a wide range of reasons for going multi-cloud, including meeting varying business needs, running certain applications, distributing risk, taking advantage of cost savings, and to provide redundancy in the event of downtime. In the industrial space specifically,...

Read more
Difference between Hashing and Encryption-01

  In recent years, the number of intruders has risen sharply. Cybercriminals use the latest technologies to take advantage of weak networks and wreak havoc with the data lying in the servers. In most cases, businesses are lax in ensuring proper systems to thwart such data breaches. It makes them the sitting ducks for hackers who are always looking for vulnerabilities in business networks. Hashing can be used to protect data. There is a hacking...

Read more
Public Cloud

One Identity has announced the availability of its Active Roles and Password Manager products in a software-as-a-service (SaaS) delivery model. The company also announced a new SaaS-delivered solution, Starling CertAccess, which delivers access request and access certification to help organisations leverage Active Directory (AD) and Azure Active Directory (AAD) in the enterprise. This announcement, coupled with the company’s previous news that its Identity Manager and Safeguard products are now available as SaaS offerings, is the...

Read more
One Identity introduces new cloud-based offerings to enable Zero Trust architectures

As the transition to remote working has forced many companies' hands for increased or faster adoption of cloud services, One Identity has announced the availability of its new software-as-a-service (SaaS) identity governance and administration (IGA) and privileged access management (PAM) solutions. Based on the One Identity Security Platform and designed with the full IGA and PAM capabilities of its industry-leading solutions, the new SaaS offerings allow organisations to implement a Zero Trust model and are...

Read more
Menlo Security and Smartworld announce partnership in Middle East

Smartworld, one of the UAE’s leading technology providers, has today announced that it has joined the EMEA Partner Programme of Menlo Security, Inc. (Menlo Security™), provider of the world's first and only Cloud Security Platform built on an Isolation Core™. The Partnership provides UAE organizations the most effective way to eliminate all internet threats while protecting business and user productivity unlike traditional “detect and response” approaches that don’t protect against modern day threats such as...

Read more
Red Canary enters cloud workload protection space

Red Canary has announced the launch of Red Canary Cloud Workload Protection, a cloud workload protection (CWP) solution that provides visibility and threat detection for security and DevOps teams. This new solution is purpose-built for cloud Linux workloads, focuses on runtime threat protection and response, and integrates seamlessly into DevOps workflows without sacrificing system performance and reliability. "Most businesses don’t have an effective solution in place to identify compromises or adversary activity in their cloud...

Read more

Researchers at AT&T Alien Labs, the threat intelligence arm of AT&T Cybersecurity, have discovered a vulnerability in popular work collaboration platform Slack. Slack is a popular cloud-based messaging platform that is commonly used in workplace communication, with Slack Incoming Webhooks allowing users to post messages from applications to Slack. By specifying a unique URL, the message body, and a destination channel, users can send a message to any webhook using the URL for any workspace....

Read more
Page 2 of 9 1 2 3 9