Tag: Cloud Security
-
Symantec Acquires Luminate to Build on Cloud Security
Symantec has confirmed its acquisition of Luminate Security, a startup specializing in software-defined perimeter technology and zero-trust …
-
AWS Identity and Access Management Gains Tags and Attribute-Based Access Control
Amazon Web Services (AWS) recently enabled tags for IAM users and roles to ease the management of IAM resources. Notably, this release also …
-
Zscaler Cloud Security: Product Overview and Insight
Why Amazon’s AWS Cloud Business Will Continue to Grow How to Get the Most Out of Enterprise Knowledge Assets… Cisco Pushes Further Into …
-
Zscaler Cloud Security: Product Overview and Analysis
eWEEK is building a new IT products and services section that encompasses most of the categories that we cover on our site. In it, we will …
-
Pentesting Azure: Thoughts on Security in Cloud Computing
This article was originally published on SheHacksPurple. A few months ago, I worked with a customer on how a team should evaluate the …
-
The Current State of Securing Cloud Workloads and Tackling Cloud Complexity
As we’re stepping into 2019, now is a good time to look back at 2018 and reflect on the world of cloud security. A recent survey of ours, …
-
A Useful Overview Of The Cloud Controls Matrix
The Cloud Controls Matrix by Cloud Security Alliance (CSA) has always been the go-to standard when it comes to securing the cloud …
-
Microsoft rolls out new tools for enterprise security and compliance teams
Microsoft has announced a number of new capabilities and improvements for tools used by enterprise administrators. New Microsoft 365 …
-
Fortanix raises $23 million in funding for cloud security and encryption
Fortanix, a cloud security company, announced Wednesday that it raised $23 million in a Series B funding round led by Intel Capital with …
-
Secrets Management: Using Vault for Accessing the Cloud Infrastructure
We will discuss how dynamic secrets can be generated by Vault using AWS IAM Policies and how to send them to an application via API-based …
-
Break Through Cybersecurity Complexity With New Rules, Not More Tools
Let’s be frank: Chief information security officers (CISOs) and security professionals all know cybersecurity complexity is a major …
-
API Authentication With GCP Identity-Aware Proxy
Cloud Identity-Aware Proxy (Cloud IAP) is a free service that can be used to implement authentication and authorization for applications …
●●●