Eskenzi PR ad banner Eskenzi PR ad banner

Cloud Security

Read our Cloud Security News including features, how-tos, information, interviews and breaking news on the fast-growing industry. IT Security Guru is made up of a team of industry experts, providing daily news and insights into cloud security, cloud computing, exploits and vulnerabilities. For any queries relating to Cloud Security News, please contact our editorial team at [email protected]

One Identity, a leader in unified identity security, announced yesterday that its One Identity Partner Circle Program had achieved exceptional results during the recently ended fiscal year as evidenced by 80% of global company sales linked to the channel (fiscal year 2022 ended January 31). Other milestones include the addition of more than 600 new partners driven by the recent acquisition of OneLogin and the growth of new partner resources and training classes. For many...

Read more
Jack Lindsay IT Security Guru

Cloud security is the umbrella that holds within it: IaaS, PaaS and SaaS. Gartner created the SaaS Security Posture Management (SSPM) category for solutions that continuously assess security risk and manage the SaaS applications' security posture. With enterprises having 1,000 or more employees relying on dozens to hundreds of apps, the need for deep visibility and remediation for SaaS security settings is only getting more critical. The top pain points for SaaS security stem from:...

Read more
Jack Lindsay IT Security Guru

It’s unfortunate, but true: SaaS attacks continue to increase. You can’t get around it, COVID-19 accelerated the already exploding SaaS market and caused industries not planning on making a switch to embrace SaaS. With SaaS apps becoming the default system of record for organizations, it has left many struggling to secure their company’s SaaS estate. CISOs and security professionals work to limit this burgeoning threat landscape, however, it’s a work in progress.   One slight misconfiguration...

Read more
Webinar: Secure Your Cloud Environment from Evolving Threats

The IT Security Guru has teamed up with Synopsys, a recognised leader in application security, to bring you the webinar, 'Secure Your Cloud Environment from Evolving Threats'. As the migration to the cloud continues at an unabated pace, the threats in the cloud are also increasing proportionally and evolving constantly. Data breaches, misconfiguration risks, weak identity and access management controls, insider threats, multi-cloud infrastructure, and increasing complexity are just a few of the many challenges...

Read more
Jack Lindsay IT Security Guru

There is often confusion between Cloud Access Security Brokers (CASB) and SaaS Security Posture Management (SSPM) solutions, as both are designed to address security issues within SaaS applications. CASBs protect sensitive data by implementing multiple security policy enforcements to safeguard critical data. For identifying and classifying sensitive information, like Personally Identifiable Information (PII), Intellectual Property (IP), and business records, CASBs definitely help. However, as the number of SaaS apps increase, the amount of misconfigurations and...

Read more
Tripwire

Of the 73% of security professionals with responsibility for the security of public cloud who operate in a multi-cloud environment, 98% think these more complex environments pose greater security challenges, a survey conducted for Tripwire by Dimensional Research reveals.   Organizations have a wide range of reasons for going multi-cloud, including meeting varying business needs, running certain applications, distributing risk, taking advantage of cost savings, and to provide redundancy in the event of downtime. In the industrial space specifically,...

Read more
Difference between Hashing and Encryption-01

  In recent years, the number of intruders has risen sharply. Cybercriminals use the latest technologies to take advantage of weak networks and wreak havoc with the data lying in the servers. In most cases, businesses are lax in ensuring proper systems to thwart such data breaches. It makes them the sitting ducks for hackers who are always looking for vulnerabilities in business networks. Hashing can be used to protect data. There is a hacking...

Read more
Public Cloud

One Identity has announced the availability of its Active Roles and Password Manager products in a software-as-a-service (SaaS) delivery model. The company also announced a new SaaS-delivered solution, Starling CertAccess, which delivers access request and access certification to help organisations leverage Active Directory (AD) and Azure Active Directory (AAD) in the enterprise. This announcement, coupled with the company’s previous news that its Identity Manager and Safeguard products are now available as SaaS offerings, is the...

Read more
One Identity introduces new cloud-based offerings to enable Zero Trust architectures

As the transition to remote working has forced many companies' hands for increased or faster adoption of cloud services, One Identity has announced the availability of its new software-as-a-service (SaaS) identity governance and administration (IGA) and privileged access management (PAM) solutions. Based on the One Identity Security Platform and designed with the full IGA and PAM capabilities of its industry-leading solutions, the new SaaS offerings allow organisations to implement a Zero Trust model and are...

Read more
Menlo Security and Smartworld announce partnership in Middle East

Smartworld, one of the UAE’s leading technology providers, has today announced that it has joined the EMEA Partner Programme of Menlo Security, Inc. (Menlo Security™), provider of the world's first and only Cloud Security Platform built on an Isolation Core™. The Partnership provides UAE organizations the most effective way to eliminate all internet threats while protecting business and user productivity unlike traditional “detect and response” approaches that don’t protect against modern day threats such as...

Read more
Page 2 of 10 1 2 3 10