As more businesses move their operations to the cloud, the threat of cyberattacks increases exponentially. Protecting your assets in the cloud is just as important as locking your doors and setting your alarms. However, the threat vectors for cloud security are...
Cloud Security
Leveraging AI for Effective Cyber Risk Management
As organisations continue to face cyber threats and vulnerabilities, the need for effective cyber risk management practices has become increasingly critical. However, many current practices fall short in producing the intended results, and organisations must also...
The Best Practice for Mitigating Cloud Identity Security Risks
Cloud computing is by no means a new concept; it has been around since the 1950s when technologies such as mainframe computing, utility computing, grid computing, and time-sharing were first introduced. Today, cloud infrastructures are becoming the norm for...
Top Cybersecurity Trends To Lookout For in 2022
The world of technology is an ever changing one with cybersecurity being the epitome of that. Cybersecurity is an area in which the inability to adapt to change has visible and almost immediate negative consequences. It is because of this that even though it is hard...
Exploring the future of cloud solutions with Distributed Cloud
Since making a splash in the early part of the last decade, Cloud Computing has continued to evolve in order to cater to the varying use cases presented by enterprises all over the world. With the buzz word culture engulfing the technology lexicon, you would be...
Multi-factor authentication offers effective security, but not all solutions are created equal
Reports published by Proofpoint recently documenting MFA vulnerabilities in Microsoft 365 (Office 365) have likely caused concern among Microsoft customers. The report cites “critical vulnerabilities in multi-factor authentication (MFA) implementation in cloud...
Increase SSO security by going passwordless
The acceleration of digital transformation initiatives to support the remote workforce has, in turn, sped up the development of cloud-based applications. An average employee uses 36 cloud services at work according to McAfee, and accessing those applications requires...
5 Best Practices for Securing Privileged Access and Identities for the Cloud Management Console
Over the next few weeks, we’ll explore best practices for securing privileged accounts and identities in common cloud scenarios. This series can help guide effective risk reduction strategies for today and for the future as cloud workloads evolve. First up, we’re...
Cloud-sourcing: Using Global Threat Intelligence to Instantly Protect Your Cloud Assets
By Jonathan Maresky, CloudGuard Product Marketing Manager, published October 21, 2020 When it comes to security in the cloud, companies face constant, daily threats. This situation has only been exacerbated by the COVID-19 pandemic. In just 10 of the biggest data...