newsFortanix adds confidential data search for encrypted enterprise dataFortanix Confidential Data Search supports scalable searches in encrypted databases with sensitive data, without compromising data security or privacy regulations.By Shweta Sharma27 Jun 20233 minsDatabase AdministratorEncryptionCloud Security news analysis Fileless attacks surge as cybercriminals evade cloud security defensesBy Michael Hill27 Jun 20235 minsCyberattacksSupply ChainApplication SecuritybrandpostSponsored by Fortinet Taking a centralized approach to cloud securityBy Vince Hwang, senior director of products and solutions, Fortinet22 Jun 20234 minsCloud Security featureHybrid Microsoft network/cloud legacy settings may impact your future security postureBy Susan Bradley 22 Jun 20237 minsActive DirectoryWindows SecurityCloud Security brandpostSponsored by CiscoHow to secure workloads in the multi-cloud eraBy Pete Bartolik 20 Jun 20234 minsCloud Security newsWestern Digital blocks unpatched My Cloud devicesBy Shweta Sharma 20 Jun 20233 minsCloud SecurityCloud SecurityVulnerabilities newsGoogle Cloud launches Cryptomining Protection ProgramBy Samira Sarraf 08 Jun 20233 minsCloud SecurityRisk Management newsSysdig adds "end-to-end" detection and response to CNAPPBy Michael Hill 07 Jun 20234 minsIntrusion Detection SoftwareCloud Security newsLacework's new CIEM uses ML to fish out high-risk identitiesBy Shweta Sharma 06 Jun 20233 minsIdentity Management SolutionsCloud Security ArticlesnewsVeza releases access security, governance solution for SaaS applicationsSolution secures sensitive data in SaaS apps and integrates with 15 popular services including Salesforce, JIRA, GitHub, and Slack.By Michael Hill 02 May 2023 3 minsAccess ControlApplication SecurityCloud SecuritybrandpostSponsored by NTTWhy cybersecurity is now a key ingredient in business resilienceAs threats rise, businesses can only withstand cyber attacks with a security strategy that adopts the right technology and services – and breaks down silos.By James Hayes 28 Apr 2023 4 minsCyberattacksCloud SecurityCybercrimenewsAkamai’s new cloud firewall capabilities aim to protect network edgeAkamai's Prolexic network cloud firewall now offers the ability to customize access control lists and deploy them at network edges.By Shweta Sharma 26 Apr 2023 3 minsFirewallsCloud SecuritynewsAbnormal Security expands threat protection to Slack, Teams and ZoomThe new tools include message security, account takeover protection, and security posture management for cloud communication applications to protect against multi-channel threats.By Shweta Sharma 25 Apr 2023 4 minsEmail SecurityRSA ConferenceCloud SecuritynewsNew AWS GuardDuty capabilities secure container, database, serverless workloadsNew capabilities expand coverage to other AWS workloads and core deployment use cases, delivering security findings with resource-specific details.By Michael Hill 25 Apr 2023 3 minsCloud SecuritynewsCircle Security debuts platform "purpose-built" to tackle credential-driven threats, cloud attacksThe new cybersecurity company's solution is available as a device-native service, a mobile app, browser-based, and via a developer-focused API.By Michael Hill 25 Apr 2023 3 minsPasswordsAuthenticationCloud SecuritynewsPaladin Cloud launches new tool for attack surface discovery and managementThe new cloud security platform uses a plug-in based, open source offering to discover gaps in existing security controls.By Shweta Sharma 24 Apr 2023 4 minsRSA ConferenceCloud SecuritySecurity SoftwarenewsWeak credentials, unpatched vulnerabilities, malicious OSS packages causing cloud security risksSecurity teams take an average of 145 hours to solve alerts, while 80% of cloud alerts are triggered by just 5% of security rules in most environments.By Michael Hill 18 Apr 2023 4 minsCloud SecurityVulnerabilitiesnewsZeroFox partners with Google Cloud to warn users against phishing domainsIf a URL or domain flagged by ZeroFox is validated as malicious, Google will provide a warning message to users across its 5 billion devices in a matter of minutes, advising them not to access the domain in question.By Shweta Sharma 11 Apr 2023 3 minsPhishingCloud SecuritynewsSnyk bolsters developer security with fresh devsecop, cloud capabilitiesSnyk aims to boost security support for developers across their software supply chains with coding, cloud and devsecops enhancements.By Shweta Sharma 04 Apr 2023 4 minsDevSecOpsCloud Securitynews analysisSkyhawk adds ChatGPT functions to enhance cloud threat detection, incident discoveryCloud threat detection and response vendor has applied ChatGPT features to its platform in two distinct ways — earlier detection of malicious activity and explicability of attacks as they progress.By Michael Hill 29 Mar 2023 4 minsMachine LearningCloud SecurityArtificial Intelligencehow-toManaging security in the cloud through Microsoft IntuneMicrosoft’s cloud-based endpoint management service extends Active Directory features to Microsoft Azure cloud.By Susan Bradley 29 Mar 2023 6 minsMicrosoft AzureMicrosoftCloud Security Show more Show less View all Resources whitepaper The shift to a security approach for the full application stack This whitepaper discusses how technologists can optimize security for modern application stacks. The post The shift to a security approach for the full application stack appeared first on Whitepaper Repository. By WWT & AppDynamics 05 May 2023Application Performance ManagementEmerging TechnologyIT Management View all Video on demand videoHoneypots and the evolution of botnets | Salted Hash Ep 23Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm’s recent honeypot research, which gathered information showing how the bot landscape is evolving. 20 Apr 2018 12 minsAdvanced Persistent ThreatsFirewallsBackup and Recovery DJI's bounty problems and video surveillance programs | Salted Hash Ep 13 08 Jan 2018 21 minsData BreachHackingApplication Security Zero Trust networks and enterprise security strategy | Salted Hash Ep 12 18 Dec 2017 26 minsCloud SecurityCloud ComputingSecurity The latest on Azure Stack, cyberattacks, the next iPhone and ... keyboards 20 Jul 2017 41 minsAppleMicrosoftSmartphones See all videos Explore a topic Application Security Business Continuity Business Operations Careers Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticles opinion What is the dark web? How to access it and what you'll find By Darren Guccione 01 Jul 202111 mins Data BreachTechnology IndustryCybercrime