Cloud Security Briefing: News and Advice

Subscribe to Cloud Security Briefing: News and Advice feed
Updated: 58 min 5 sec ago

While prevention is key, it's not enough to protect a company's systems from ransomware. Learn how early detection with these four methods helps reduce damage from attacks.

4 hours 41 sec ago
While prevention is key, it's not enough to protect a company's systems from ransomware. Learn how early detection with these four methods helps reduce damage from attacks.

Identity and access management is changing and so must strategies for managing it. Read up on IAM architecture approaches and how to select the best for your organization.

Wed, 04/02/2025 - 4:49pm
Identity and access management is changing and so must strategies for managing it. Read up on IAM architecture approaches and how to select the best for your organization.

Enterprise cybersecurity hygiene must be a shared responsibility between employees and employers. Learn how both can get the job done with this checklist.

Wed, 04/02/2025 - 4:49pm
Enterprise cybersecurity hygiene must be a shared responsibility between employees and employers. Learn how both can get the job done with this checklist.

Certifications can help security pros prove their baseline knowledge of infosec topics. Consider adding these top cloud security certifications to your arsenal.

Wed, 04/02/2025 - 4:49pm
Certifications can help security pros prove their baseline knowledge of infosec topics. Consider adding these top cloud security certifications to your arsenal.

No longer just a good idea, IAM is a crucial piece of the cybersecurity puzzle. It's how an organization regulates access to information and meets its compliance obligations.

Wed, 04/02/2025 - 4:49pm
No longer just a good idea, IAM is a crucial piece of the cybersecurity puzzle. It's how an organization regulates access to information and meets its compliance obligations.

SIEM, SOAR and XDR each possess distinct capabilities and drawbacks. Learn the differences among the three, how they can work together and which your company needs.

Wed, 04/02/2025 - 4:49pm
SIEM, SOAR and XDR each possess distinct capabilities and drawbacks. Learn the differences among the three, how they can work together and which your company needs.

With cyberthreats and security incidents growing by the day, every organization needs a solid incident response plan. Learn how to create one for your company.

Wed, 04/02/2025 - 4:49pm
With cyberthreats and security incidents growing by the day, every organization needs a solid incident response plan. Learn how to create one for your company.

Extended detection and response tools are open or native. Learn the differences between them, and get help choosing the right XDR type for your organization.

Wed, 04/02/2025 - 4:49pm
Extended detection and response tools are open or native. Learn the differences between them, and get help choosing the right XDR type for your organization.

Let's break down some cloud security alphabet soup. CASB, CSPM and CWPP overlap to an extent, but you'll want to pay close attention to how they accomplish different things.

Wed, 04/02/2025 - 4:49pm
Let's break down some cloud security alphabet soup. CASB, CSPM and CWPP overlap to an extent, but you'll want to pay close attention to how they accomplish different things.

When it comes to adopting SASE or zero trust, it's not a question of either/or, but using SASE to establish and enable zero-trust network access.

Wed, 04/02/2025 - 4:49pm
When it comes to adopting SASE or zero trust, it's not a question of either/or, but using SASE to establish and enable zero-trust network access.

SaaS has become ubiquitous. To secure it, take steps to inventory SaaS usage, securely authenticate usage, encrypt data, adopt single sign-on and more.

Wed, 04/02/2025 - 4:49pm
SaaS has become ubiquitous. To secure it, take steps to inventory SaaS usage, securely authenticate usage, encrypt data, adopt single sign-on and more.

With so many apps and data residing in cloud, employing a security framework to help protect cloud infrastructure is an essential move for an organization.

Wed, 04/02/2025 - 4:49pm
With so many apps and data residing in cloud, employing a security framework to help protect cloud infrastructure is an essential move for an organization.

Automating security in the cloud can be invaluable for threat detection and mitigation. Explore key areas where security professionals should implement automation.

Wed, 04/02/2025 - 4:49pm
Automating security in the cloud can be invaluable for threat detection and mitigation. Explore key areas where security professionals should implement automation.

This cloud security guide explains challenges enterprises face today; best practices for securing and managing SaaS, IaaS and PaaS; and comparisons of cloud-native security tools.

Wed, 04/02/2025 - 4:49pm
This cloud security guide explains challenges enterprises face today; best practices for securing and managing SaaS, IaaS and PaaS; and comparisons of cloud-native security tools.

What are the necessary components of a cloud security policy, and why should an organization go to the trouble to create one? Download a template to get the process started.

Wed, 04/02/2025 - 4:49pm
What are the necessary components of a cloud security policy, and why should an organization go to the trouble to create one? Download a template to get the process started.

The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing.

Wed, 04/02/2025 - 4:49pm
The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing.

Most enterprises have siloed departments, but SASE's convergence of network and security functions is disrupting those constructs and driving the need for more team communication.

Wed, 04/02/2025 - 4:49pm
Most enterprises have siloed departments, but SASE's convergence of network and security functions is disrupting those constructs and driving the need for more team communication.

Before jumping feet first into the cloud, understand the new and continuing top cloud security challenges your organization is likely to face -- and how to mitigate them.

Wed, 04/02/2025 - 4:49pm
Before jumping feet first into the cloud, understand the new and continuing top cloud security challenges your organization is likely to face -- and how to mitigate them.

CASB tools help secure cloud applications so only authorized users have access. Discover more about this rapidly evolving technology and its use cases.

Wed, 04/02/2025 - 4:49pm
CASB tools help secure cloud applications so only authorized users have access. Discover more about this rapidly evolving technology and its use cases.

If your company is using a cloud database, it's critical to stay on top of security. Review the security features offered by top cloud providers, plus some best practices.

Wed, 04/02/2025 - 4:49pm
If your company is using a cloud database, it's critical to stay on top of security. Review the security features offered by top cloud providers, plus some best practices.