Eskenzi PR ad banner Eskenzi PR ad banner

Cloud Security

Read our Cloud Security News including features, how-tos, information, interviews and breaking news on the fast-growing industry. IT Security Guru is made up of a team of industry experts, providing daily news and insights into cloud security, cloud computing, exploits and vulnerabilities. For any queries relating to Cloud Security News, please contact our editorial team at [email protected]

it security

Imagine you're about to log into your favorite online shopping site. You type in your username, and before you know it, you're prompted for not just your password but also a fingerprint or a code sent to your phone. This is a shining example of advanced authentication in action, enhancing security in our digital lives. It's not just about knowing a password; it's about proving who you are with something you know, something you have, or something...

Read more
it security

Have you ever considered why your online bank account has so many checks before you can see your balance? Or why your workplace might require a special card to get past the front door? At the heart of all these measures is a critical concept we're all becoming more familiar with, whether we realize it or not — what is identity security. It's about making sure that the individual trying to access services or information is...

Read more
Keeper Security study shows cultural changes imperative to improve cyber incident reporting

Keeper Security, a provider of zero-trust and zero-knowledge cybersecurity software protecting passwords, passkeys, privileged access, secrets and remote connections, has announced that Keeper Secrets Manager (KSM) can now be integrated with ServiceNow. This integration enables enterprises to manage and protect their secrets with a fully managed, cloud-based platform that is both affordable and easy to deploy.   KSM is Keeper’s platform for securing infrastructure secrets such as API keys, database passwords, access keys, certificates and...

Read more
AT&T Cybersecurity grows SASE offering by adding Palo Alto Networks

The Australian Home Affairs department may want to bury their heads in the sand after accidentally exposing sensitive information of more than 50 small business survey participants. Why were they being surveyed? Ironically, to get their thoughts on cybersecurity. It is believed the names, business names, phone numbers and emails of the participants in the survey were released on the parliament website in response to a question for a government cybersecurity report. The report is...

Read more
New Research Highlights Increased Security Risks Posed by Remote Working and BYOD

New research released by  Lookout, Inc. the increased number of growing threats associated with remote work and bring your own device (BYOD) policies faced by organisations. The State of Remote Work Security aims to help raise awareness amongst IT and security leaders about the growing threats associated with remote work and bring your own device (BYOD) policies. Survey results show that with remote and hybrid working, personal and work tasks blur together and the boundaries...

Read more
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Today, Cato Networks has been named the Leader in the Single-Vendor SASE Quadrant Analysis published in TechTarget. "We're honoured to be identified as the Leader in single-vendor SASE market," says Shlomo Kramer, CEO and co-founder of Cato Networks. "Cato introduced the first worldwide SASE platform in 2016, four years before Gartner defined the term. Since then, we've continued to enhance and extend Cato SASE Cloud as recognized by this award." Why Single-Vendor SASE? While SASE brings...

Read more
Synopsys Finds Significant Increase in Practices to Bolster Software Supply Chain Security

Analysing the software security practices of 130 organisations including Adobe, PayPal and Lenovo, Synopsys's Building Security in Maturity Model (BSIMM) report has found a nearly 50% surge in activities to secure open source software components and integrate security into developer toolchains; indicating greater initiative to tackle software supply chain security over the last 12 months. The findings highlight a significant increase in activities that indicate BSIMM member organizations are implementing a “shift everywhere” approach to...

Read more

As competition becomes fiercer, with technology being a primary tool for attaining competitive advantage, migrating to the cloud has become inevitable. Besides levelling the playfield, cloud technologies are a future-ready solution that makes running a business simpler and safer. Here, we look at five benefits of moving to the cloud. 1.   Improved security The cloud is designed for maximum data security, thanks to high levels of encryption and security layers that give it an edge...

Read more
deepsecure.jpg

With a greater reliance placed on data systems and networks to support the needs of a highly-evolved commercial system, cyber security is not everyone’s business no matter their sector. The following tips can help you increase your business’ vigilance and cybersecurity solutions in the face of cyber attacks.     1 – Understand that “You are a target to hackers”  It is no longer safe to assume that “this can’t happen to me.” Everyone is at...

Read more
Learn Why Adaptive Shield Provides Ultimate SaaS Security Posture Management

Whether it’s Office 365, Salesforce, Slack, GitHub or Zoom, all SaaS apps include a host of security features designed to protect the business and its data. The job of ensuring that these apps’ security settings are properly configured falls on the security team. The challenge lies within how burdensome this responsibility is: Each app has tens or hundreds of security settings to configure. In addition, there is a continuous need for updates to the global...

Read more
Page 1 of 10 1 2 10