Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register

Cybersecurity

Chris Hughes-Circle

Chris Hughes

Welcome to the Cloud Wars Cybersecurity Channel

Join us as we explore the rapidly expanding and diverse threat landscape through the lens of business growth and resiliency. We also deliver context on the cybersecurity strategies of the top Cloud and AI tech providers, as well as how technology can help customers stay ahead of the most pressing security threats.
Cyber Insurance
Cybersecurity

5 Value Propositions That Make AWS Cyber Insurance Transformative for Customers

By Chris HughesAugust 10, 2023

AWS unveils a game-changing Cyber Insurance Program to address common challenges in the cyber insurance market, offering quick quotes, multiple insurer options, and use of AWS services for streamlined assessments.

Acceleration Economy Minute

Endor Labs Report: Current Large Language Models (LLMs) Not Ready for Malware Detection

By Kieron AllenAugust 7, 2023

Endor Labs’ State of Dependency Management Report evaluates Large Language Models’ current potential to evaluate malware. The upshot: They’re not ready for prime time.

Wiz Cloud Security
Cybersecurity

Wiz Takes a Holistic, Cloud-Native Approach to Cloud Security While Replacing Point Products

By Kieron AllenAugust 3, 2023

The Wiz cloud security platform gives comprehensive control over customers’ cloud infrastructure and applications, while providing a visual ‘Graph’ of the environment.

Chris Hughes discusses AWS's security data lake
Cloud Wars Minute

Amazon Security Lake in AWS Centralizes Data From Multiple Sources

By Chris HughesAugust 2, 2023

Amazon Security Lake capability enables organizations to centralize security data from various environments into a single purpose-built data lake.

Kieron Allen reports that Trend Micro is leading the cloud security vendor market
Acceleration Economy Minute

Trend Micro Named Top Cloud Security Vendor for 5th Consecutive Year

By Kieron AllenJuly 28, 2023

Trend Micro’s market share is more than twice the size of its closest competitor in the cloud workload security sector, according to IDC report.

Cybersecurity

Lookout China Connect Service Simplifies International Business Operations

By Kieron AllenJuly 24, 2023

New Lookout service solves an important problem for companies with employees in mainland China, enabling secure, high performance access to data and applications.

AI cybersecurity trend micro
Cybersecurity

Trend Micro’s Vision One Platform Uses AI to Streamline Cybersecurity

By Chris HughesJuly 19, 2023

Trend Micro is integrating AI into its cybersecurity platform to empower organizations with enhanced capabilities.

Generative AI Hacker Risk
Cybersecurity

3 Significant Cybersecurity Risks Presented by Generative AI

By Frank DomizioJuly 10, 2023

There are several security risks associated with generative AI, including AI-powered social engineering attacks and evasion of traditional security defenses.

AI cybersecurity
Cybersecurity

Generative AI Holds the Power to Transform Core Cybersecurity Functions

By Robert WoodJuly 6, 2023

The potential of generative AI goes far beyond image generation and blog writing—it is a game-changer for staying ahead of evolving cybersecurity threats.

Chris Hughes
Cybersecurity Minute

From Incident Response to Predictive Analytics, Process Mining Enhances Cybersecurity

By Chris HughesJuly 6, 2023

Process mining has several potential cybersecurity applications including incident investigation, anomaly detection, and detecting insider threats.

Rob Wood
Cybersecurity Minute

Generative AI Helps Cybersecurity Teams Scan, Summarize Massive Data Volumes

By Robert WoodJuly 1, 2023

As cybersecurity teams face escalating demands and the need for faster responses, generative AI tcan help by scanning and summarizing vast amounts of data.

AI LLMs Endor Labs
Cybersecurity Minute

Endor Labs Details Results of Using AI, ChatGPT to Detect Malware

By Chris HughesJune 30, 2023

An Endor Labs study sheds light on ways to use ChatGPT in defensive cybersecurity. The company tapped AI to detect malware.

SaaS sprawl
Cybersecurity

SaaS Application and Data Sprawl Creates a New Frontier for Cybersecurity Leaders

By Robert WoodJune 30, 2023

The increasing adoption of cloud services, particularly software-as-a-service (SaaS), has reshaped the role of the chief information security officer (CISO).

Hard-Coded Secrets
Cybersecurity Minute

How to Address the Risks of Hard-Coded Secrets in Software Development

By Robert WoodJune 29, 2023

Discover why closing the loop by fixing code is essential to effectively combat the security risk of hard-coded secrets.

lookout financial services
Cybersecurity

Lookout Research: Financial Services Complexity Mandates New Security Approaches

By Kieron AllenJune 28, 2023

New research from Lookout identifies key pain points impacting the cybersecurity readiness of financial services firms, and recommends new approaches.

Cybersecurity Minute

Chainguard’s Container Image Registry Helps Manage Cloud Egress Fees

By Frank DomizioJune 28, 2023

Chainguard’s container image registry powered by Cloudflare R2 aims to mitigate the escalating cost of downloading container images.

Cybersecurity Minute

Securing SaaS Applications Starts With Building an Inventory

By Robert WoodJune 28, 2023

A proactive approach to SaaS security — starting with asset management — can protect against data misuse and other potential vulnerabilities.

Lookout financial services
Acceleration Economy Minute

Lookout Data Pinpoints Cybersecurity Challenges in Financial Services

By Kieron AllenJune 27, 2023

In a survey covering hundreds of IT and cybersecurity leaders, Lookout pinpoints areas of complexity and cybersecurity challenges facing financial services firms.

fortinet ransomware edge attacks AI
Cybersecurity

Fortinet Report Details Growth in Ransomware as a Service, Edge Attacks, and Weaponized AI

By Chris HughesJune 26, 2023

Fortinet’s “Cyber Threat Predictions for 2023” report examines the rise of ransomware, the mainstreaming of edge attacks, and the weaponization of AI.

EU Sovereign Cloud
Cloud Wars Minute

Oracle’s EU Sovereign Cloud Aims to Address Data Residency Risks

By Aaron BackJune 23, 2023

With its EU Sovereign Cloud, Oracle aims to address common risks associated with data residency, privacy, and management.

Previous 1 … 7 8 9 10 11 … 46 Next

Featured Story

Why Cybersecurity Is a Critical Component of ESG Frameworks

2 years ago
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Read More »

Make better decisions to compete in the acceleration economy in just 5 minutes

Subscribe to our Headlines newsletter.
This field is for validation purposes and should be left unchanged.
Cloud Wars Subscriber Content

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Endpoint & Mobile Data Protection

December 11, 2023

The Role of CASB with DLP | Unlocking Hybrid Work’s Potential Safely

November 16, 2023

The Business Impact and Opportunity of Generative AI

September 29, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }