A recently uncovered vulnerability in a class of Amazon Web Service APIs can be exploited to leak AWS identity and access management user and arbitrary accounts, according to Palo Alto Networks' Unit 42.
European lawmakers are once again considering encryption policies and attempting to strike a balance between the privacy and security afforded by strong encryption and law enforcement's needs. But with encryption being a cornerstone of the internet, is there any new balance to be struck?
Digital transformation is accelerating. Organizations are adopting SAAS solutions at increasing rates to reduce internal IT constraints and budgets. This webinar will take a deep dive into IBM's Cloud Pak for Security.
A successful Cloud journey needs security to be considered at every stage.
In this webinar, Scott McAvoy, Cloud Security Competency Lead of IBM will be outlining how to get security right with an open and integrated approach.
Robotic Process Automation (RPA) is a fast route to increased efficiency, productivity and quality. From a cyber security perspective, RPA also brings a new and attractive attack surface with the proliferation of privileged access as a prime concern.
This CISO View research report examines issues such as:
83% of organizations are looking for new monitoring approaches to handle today's cloud complexity. IT teams are challenged with monitoring cloud services and mission-critical applications by separate tools which lead to swivel chair approaches, runaway costs, and fragmented operational data getting trapped in siloed...
Attackers have been actively exploiting a flaw in Rackspace's hosted email service to send phishing emails, bearing legitimate and validated domain names, as part of business email compromise scams, warns IT security testing consultancy 7 Elements. Rackspace tells customers it plans to fix the problem soon.
While each organization's cloud journey is unique, it is best practice to enforce and maintain consistent, enterprise-wide privileged access management policies.
Included are four use cases that highlight best practices in securing privileged access for your infrastructure and applications in the cloud.
Regardless of where enterprises are in their cloud journey, CyberArk's goal is to enable enterprises to protect their assets in AWS by providing powerful solutions for securing privileged access at each stage of their journey.
Download this white paper to learn how CyberArk Solutions can be deployed with CyberArk's...
Regardless of where enterprises are in their cloud journey, CyberArk's goal is to help enterprises protect their cloud workloads on Microsoft Azure by providing powerful solutions for securing privileged access at each stage of their journey, from hybrid to "all in" cloud deployments.
Download this white paper to...
Cloud migration isn't just an opportunity to transform business; it's a chance to completely re-do the cybersecurity model, says Dr. Anton Chuvakin of Chronicle. He explains the business benefits of security transformation and how to initiate it from day one in the cloud.
Not only have enterprises accelerated their shift to the cloud in 2020, but they have also leapfrogged into multi-cloud environments. With this transition comes the top challenge: Maintaining appropriate visibility. Joe Partlow of ReliaQuest discusses how to tackle this challenge.
Understand potential risks in your cluster, and the best practices for securing sensitive workloads
The most important things to keep in mind when you host sensitive workloads on Kubernetes
How to understand potential risks in your cluster
Access control variabilities, and security monitoring and auditing...