Eskenzi PR ad banner Eskenzi PR ad banner

Cloud Security

Read our Cloud Security News including features, how-tos, information, interviews and breaking news on the fast-growing industry. IT Security Guru is made up of a team of industry experts, providing daily news and insights into cloud security, cloud computing, exploits and vulnerabilities. For any queries relating to Cloud Security News, please contact our editorial team at [email protected]

Check Point Software Recognised as a Leader in GigaOm Radar Report for Security Policy as Code

Check Point Software has been named a Leader in GigaOm's latest Radar Report for Security Policy as Code. Check Point’s CloudGuard, part of the Infinity Platform, offers comprehensive code security capabilities designed to help businesses defend against the ever-changing landscape of cyber threats. “At Check Point, we recognise the challenges in safeguarding digital assets in the cloud. Being recognised as a Leader in GigaOm's Security Policy as Code report is a testament to our commitment,”...

Read moreDetails

Keepit, a global provider of a comprehensive cloud backup and recovery platform, today released a survey conducted by Foundry, as well as a study based on in-depth interviews conducted by Keepit. Both reveal critical gaps in disaster recovery strategies and highlight the pressing need for enhanced data security measures. In an evolving technological landscape, enterprise IT leaders are grappling with unprecedented challenges in data protection and governance, driven by the rapid adoption of cloud applications...

Read moreDetails
cloud-migration

In the contemporary landscape of digital transformation, businesses are increasingly recognising the advantages of migrating from local spreadsheet applications to cloud-based solutions. This paradigm shift offers enhanced collaboration, real-time accessibility, and improved data security. Navigating this transition effectively is pivotal for ensuring a seamless workflow. In this comprehensive guide, we explore the step-by-step process of migrating your local spreadsheets to the cloud. Assess Your Current Spreadsheet Ecosystem Before embarking on the migration journey, it's crucial...

Read moreDetails

New technologies and innovations do not happen in a vacuum. For every development, there’s a generation of researchers, engineers, and inventors who spend countless hours brainstorming solutions. Before the internet, this community would congregate at in-person conferences and seminars, where the knowledge they’d distilled was shared and discussed. With the advent of the World Wide Web, online Q&A communities like Experts Exchange, Quora, and Stack Overflow became the new tech town squares for collaboration and...

Read moreDetails
it security

Imagine you're about to log into your favorite online shopping site. You type in your username, and before you know it, you're prompted for not just your password but also a fingerprint or a code sent to your phone. This is a shining example of advanced authentication in action, enhancing security in our digital lives. It's not just about knowing a password; it's about proving who you are with something you know, something you have, or something...

Read moreDetails
it security

Have you ever considered why your online bank account has so many checks before you can see your balance? Or why your workplace might require a special card to get past the front door? At the heart of all these measures is a critical concept we're all becoming more familiar with, whether we realize it or not — what is identity security. It's about making sure that the individual trying to access services or information is...

Read moreDetails
Keeper Security study shows cultural changes imperative to improve cyber incident reporting

Keeper Security, a provider of zero-trust and zero-knowledge cybersecurity software protecting passwords, passkeys, privileged access, secrets and remote connections, has announced that Keeper Secrets Manager (KSM) can now be integrated with ServiceNow. This integration enables enterprises to manage and protect their secrets with a fully managed, cloud-based platform that is both affordable and easy to deploy.   KSM is Keeper’s platform for securing infrastructure secrets such as API keys, database passwords, access keys, certificates and...

Read moreDetails
AT&T Cybersecurity grows SASE offering by adding Palo Alto Networks

The Australian Home Affairs department may want to bury their heads in the sand after accidentally exposing sensitive information of more than 50 small business survey participants. Why were they being surveyed? Ironically, to get their thoughts on cybersecurity. It is believed the names, business names, phone numbers and emails of the participants in the survey were released on the parliament website in response to a question for a government cybersecurity report. The report is...

Read moreDetails
New Research Highlights Increased Security Risks Posed by Remote Working and BYOD

New research released by  Lookout, Inc. the increased number of growing threats associated with remote work and bring your own device (BYOD) policies faced by organisations. The State of Remote Work Security aims to help raise awareness amongst IT and security leaders about the growing threats associated with remote work and bring your own device (BYOD) policies. Survey results show that with remote and hybrid working, personal and work tasks blur together and the boundaries...

Read moreDetails
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Today, Cato Networks has been named the Leader in the Single-Vendor SASE Quadrant Analysis published in TechTarget. "We're honoured to be identified as the Leader in single-vendor SASE market," says Shlomo Kramer, CEO and co-founder of Cato Networks. "Cato introduced the first worldwide SASE platform in 2016, four years before Gartner defined the term. Since then, we've continued to enhance and extend Cato SASE Cloud as recognized by this award." Why Single-Vendor SASE? While SASE brings...

Read moreDetails
Page 1 of 10 1 2 10