Best Practices for Securing Cloud Environments Against Cyber Threats Post date November 12, 2024 Post author By Advait Patel Post categories In cloud-security, cybersecurity-best-practices, data-encryption, data-protection, digital-privacy, identity-access-management, information-security, security-audit
How a Compromised NPM Package Revealed GitHub Workflow Vulnerabilities Post date October 5, 2024 Post author By Kadet Post categories In cloud-security, github, github-actions-workflow, github-secrets, github-security, github-vulnerabilities, open-source-vulnerabilities, web3-security
The Data Security Duo: Data Encryption and Vulnerability Scans Post date August 26, 2024 Post author By jarrid.xyz Post categories In cloud-security, data-encryption, data-engineering, data-security, infosec, product-engineering, vulnerability-management, vulnerability-scans
How Data Encryption Can Simplify Infrastructure Architecture Post date August 14, 2024 Post author By jarrid.xyz Post categories In cloud-security, cryptography, data-security, iam-based-oauth, infosec, infrastructure-architecture, security-engineering, software-architecture
Code Smell 263 – Squatting Post date August 14, 2024 Post author By Maximiliano Contieri Post categories In aws, clean code, cloud-security, secure-your-cloud-resources, security, software engineering, software-development, squatting-in-programming
Over 100K+ Sites Hit by Polyfill.io Supply Chain Attack Post date June 29, 2024 Post author By Sergio De Simone Post categories In cdn, cloud-security, development, JavaScript, News, Software Supply Chain, web-development
Cyber Polygon Returns to Simulate an Advanced Targeted Attack on a Tech Company Post date June 18, 2024 Post author By The Sociable Post categories In ai-in-cybersecurity, cloud-security, cyber-attack, cyber-attack-on-ai-startup, cyber-attack-prevention, cyber-attack-simulation, cyber-defense-training, cyber-polygon-2024
Software Security Report Finds JavaScript Applications Have Fewer Flaws Than Java and .NET Post date February 8, 2023 Post author By Matt Campbell Post categories In .NET, application-security, cloud-security, development, devops, java, JavaScript, News, static-analysis
Critical Vulnerability in VM2 Sandbox Found Affecting Spotify Portal Platform Backstage Post date November 28, 2022 Post author By Sergio De Simone Post categories In cloud-security, devops, JavaScript, News, open source, security-vulnerabilities, templating
Check Your Privilege: Designing Cloud Infrastructures According to the Least Privilege Principle Post date December 8, 2021 Post author By Check Point Software Post categories In checkpoint, cloud, cloud-infrastructure-privilege, cloud-security, cybersecurity, good-company, least-privilege, security
Hundreds of Google and Amazon Employees Oppose the Israeli “Nimbus” Cloud Project Post date November 17, 2021 Post author By Craig Lebrau Post categories In amazon, cloud-computing, cloud-infrastructure, cloud-security, Google, Google Cloud Platform, google-cloud-services, israel
The 4 Biggest Cloud Computing Security Challenges Post date November 4, 2021 Post author By Aikma Post categories In businesses-and-cloud-computing, cloud-computing, cloud-security, cloudcomputing, security, security-breaches, security-top-story, threats
What Makes a Cloud Enterprise Technology Stand Out Post date October 24, 2021 Post author By Henry Bell Post categories In cloud, cloud-computing, cloud-enterprise-technology, cloud-infrastructure, cloud-security, enterprise-technology, tech-trends, technology
How to Master AWS Identity and Access Management Post date October 6, 2021 Post author By Taavi Rehemägi Post categories In aws, aws-iam, backend, cloud-computing, cloud-security, devops, programming, serverless
What Poses a Challenge to Security in a Multi-Cloud Environment Post date September 22, 2021 Post author By Check Point Software Post categories In checkpoint, cloud-security, cyber-security, good-company, it-security-policy, security, security-in-multi-cloud, threat-detection
Cloud Threat Hunting: Investigating Lateral Movement Post date August 28, 2021 Post author By Check Point Software Post categories In aws, checkpoint, cloud-computing, cloud-security, cybersecurity, good-company, lateral-movement, security
Securing Serverless Applications with Critical Logging Post date August 27, 2021 Post author By Taavi Rehemägi Post categories In aws, aws-lambda, aws-security, cloud-security, devops, serverless, software-architecture, software-development
Why You Should Think About Switching To The Cloud Hosting today Post date August 22, 2021 Post author By Evgenia Kuzmenko Post categories In aws, cloud-computing, cloud-hosting, cloud-infrastructure, cloud-security, cloud-storage, cloudservices, Google Cloud Platform, web-monetization
CVEs: How Keeping a Catalogue of Common Vulnerabilities and Exposures Helps Your Company Post date August 17, 2021 Post author By Deepak Gupta Post categories In cloud-computing, cloud-security, cyber-threats, cybersecurity, data-security, enterprise-security, security, vulnerabilities
9 Dropbox Alternatives for Evidence Management in Law Enforcement Post date July 20, 2021 Post author By Osama Zahid Post categories In cloud, cloud-security, cloud-storage, data, digital, evidence, law-enforcement, management-system
Why You Should Adopt Cloud Computing in Healthcare Post date July 14, 2021 Post author By ITRex Post categories In businesses-and-cloud-computing, cloud-computing, cloud-security, cloud-solutions, good-company, healthcare, medical-technology, technology
Enterprise Cloud Security Guide: Secure Application Development Post date July 5, 2021 Post author By Shekhar Jha Post categories In cloud-security, cybersecurity, development, devops-security, devsecops, enterprise-security, security
Strategies for Combating Cloud Security Risks Post date June 23, 2021 Post author By Stephen Lange Post categories In aws, cloud, cloud-orchestration, cloud-security, cybersecurity, data-security, kms, security
It’s Raining Cyber Attacks: Cybersecurity in the Cloud Post date June 17, 2021 Post author By Pavan Belagatti Post categories In artifactory, cloud-computing, cloud-security, cybersecurity, cyberthreats, devops-security, devsecops, security
AI Will Reshape the Cybersecurity World in 2021 Post date June 8, 2021 Post author By X-Phy Post categories In ai, ai-and-cybersecurity, cloud-security, cyber-security-trends, cybersecurity, data, future-of-ai, role-of-ai-in-cyber-security
Don’t Fear The Cloud When it Comes to Data Integration Post date May 25, 2021 Post author By Harry Post categories In cloud, cloud-computing, cloud-infrastructure, cloud-security, cloud-storage, data-integration, data-privacy, hackernoon-top-story
What Does the Future Hold for Cloud Security? Post date May 2, 2021 Post author By Jesse Almeda Post categories In ai, cloud, cloud-computing, cloud-infrastructure, cloud-security, cybersecurity, cybersecurity-tips, security
Cloud Security Strategies For Small Businesses Post date April 3, 2021 Post author By TechMoths Post categories In cloud, cloud-computing, cloud-infrastructure, cloud-security, cloud-service, cloudservices, data-protection, programming
Businesses Will Face These 4 Cloud Security Challenges in 2021 Post date February 21, 2021 Post author By Roji Gomez Post categories In cloud-computing, cloud-migration, cloud-security, cloudservices, cyber-security, data-breach, data-security, insider-threats
Enterprise Cloud Security: Setting Up Structure, Identity-Based Access, and Network Control Post date February 15, 2021 Post author By Shekhar Jha Post categories In cloud-infrastructure, cloud-migration, cloud-migration-strategy, cloud-security, hybrid-cloud, identity-and-access-management, multi-cloud-approach, network-security
Managing Enterprise Cloud Security vs On-Prem Security Post date February 14, 2021 Post author By Shekhar Jha Post categories In cloud, cloud-based, cloud-migration, cloud-migration-strategy, cloud-security, cyber-security, enterprise-security, invest-in-cyber-security
Your Ultimate Guide To The 4 Types of IT Security Post date February 8, 2021 Post author By Roddrick Mixson Post categories In cloud-security, cyber-security, cybersecurity, endpoint-security, internet-security, it-security, it-security-strategy, network-security