Feed aggregator

With cyberthreats and security incidents growing by the day, every organization needs a solid incident response plan. Learn how to create one for your company.

With cyberthreats and security incidents growing by the day, every organization needs a solid incident response plan. Learn how to create one for your company.

Extended detection and response tools are open or native. Learn the differences between them, and get help choosing the right XDR type for your organization.

Extended detection and response tools are open or native. Learn the differences between them, and get help choosing the right XDR type for your organization.

Let's break down some cloud security alphabet soup. CASB, CSPM and CWPP overlap to an extent, but you'll want to pay close attention to how they accomplish different things.

Let's break down some cloud security alphabet soup. CASB, CSPM and CWPP overlap to an extent, but you'll want to pay close attention to how they accomplish different things.

When it comes to adopting SASE or zero trust, it's not a question of either/or, but using SASE to establish and enable zero-trust network access.

When it comes to adopting SASE or zero trust, it's not a question of either/or, but using SASE to establish and enable zero-trust network access.

SaaS has become ubiquitous. To secure it, take steps to inventory SaaS usage, securely authenticate usage, encrypt data, adopt single sign-on and more.

SaaS has become ubiquitous. To secure it, take steps to inventory SaaS usage, securely authenticate usage, encrypt data, adopt single sign-on and more.

With so many apps and data residing in cloud, employing a security framework to help protect cloud infrastructure is an essential move for an organization.

With so many apps and data residing in cloud, employing a security framework to help protect cloud infrastructure is an essential move for an organization.

Automating security in the cloud can be invaluable for threat detection and mitigation. Explore key areas where security professionals should implement automation.

Automating security in the cloud can be invaluable for threat detection and mitigation. Explore key areas where security professionals should implement automation.

This cloud security guide explains challenges enterprises face today; best practices for securing and managing SaaS, IaaS and PaaS; and comparisons of cloud-native security tools.

This cloud security guide explains challenges enterprises face today; best practices for securing and managing SaaS, IaaS and PaaS; and comparisons of cloud-native security tools.

What are the necessary components of a cloud security policy, and why should an organization go to the trouble to create one? Download a template to get the process started.

What are the necessary components of a cloud security policy, and why should an organization go to the trouble to create one? Download a template to get the process started.

The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing.

The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing.

Most enterprises have siloed departments, but SASE's convergence of network and security functions is disrupting those constructs and driving the need for more team communication.

Most enterprises have siloed departments, but SASE's convergence of network and security functions is disrupting those constructs and driving the need for more team communication.

Before jumping feet first into the cloud, understand the new and continuing top cloud security challenges your organization is likely to face -- and how to mitigate them.

Before jumping feet first into the cloud, understand the new and continuing top cloud security challenges your organization is likely to face -- and how to mitigate them.

CASB tools help secure cloud applications so only authorized users have access. Discover more about this rapidly evolving technology and its use cases.

CASB tools help secure cloud applications so only authorized users have access. Discover more about this rapidly evolving technology and its use cases.

If your company is using a cloud database, it's critical to stay on top of security. Review the security features offered by top cloud providers, plus some best practices.

If your company is using a cloud database, it's critical to stay on top of security. Review the security features offered by top cloud providers, plus some best practices.

A uniform resource identifier (URI) is a character sequence that identifies a logical (abstract) or physical resource -- usually, but not always, connected to the internet.

Security Wire Weekly - 6 hours 22 min ago
A uniform resource identifier (URI) is a character sequence that identifies a logical (abstract) or physical resource -- usually, but not always, connected to the internet.
Categories: Security Wire Weekly

A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

Security Wire Weekly - 6 hours 22 min ago
A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.
Categories: Security Wire Weekly

Check out the latest security news from the Informa TechTarget team.

Security Wire Weekly - 6 hours 22 min ago
Check out the latest security news from the Informa TechTarget team.
Categories: Security Wire Weekly

IT automation is the use of instructions to create a clear, consistent and repeatable process that replaces an IT professional's manual work in data centers and cloud deployments.

Security Wire Weekly - 6 hours 22 min ago
IT automation is the use of instructions to create a clear, consistent and repeatable process that replaces an IT professional's manual work in data centers and cloud deployments.
Categories: Security Wire Weekly

Implementing an effective REST API authentication strategy can help protect users and their data while maintaining a seamless data exchange across boundaries.

Security Wire Weekly - 6 hours 22 min ago
Implementing an effective REST API authentication strategy can help protect users and their data while maintaining a seamless data exchange across boundaries.
Categories: Security Wire Weekly

Internet Key Exchange (IKE) is a standard protocol used to set up a secure and authenticated communication channel between two parties via a virtual private network (VPN).

Security Wire Weekly - 6 hours 22 min ago
Internet Key Exchange (IKE) is a standard protocol used to set up a secure and authenticated communication channel between two parties via a virtual private network (VPN).
Categories: Security Wire Weekly

Pages