Nearly all cloud security incidents are due to customer misconfigurations. Chris Hughes explains how cybersecurity hygiene addresses the problem.
security
Kieron Allen highlights how CockroachDB Dedicated is PCI-DSS certified, making it easier for customers to protect payment card information.
Janet Schijns outlines eights services a cybersecurity channel partner can offer your company, especially if you’re not resourced to hire a CISO.
Software bills of materials are important because they serve as standardized artifacts in developmental processes, as well as for security and compliance.
Leonard Lee defines what SASE is and puts it in the context of edge-computing. He describes the five core capabilities of SASE and lists key takeaways for the C-suite.
Is your business prepared to hyperautomate and use AI to get ahead? Our guidebook provides first-person actionable insights from practitioners.
Contextual analysis makes Application Security (AppSec) more efficient by identifying the most exploitable vulnerabilities, CISO Chris Hughes says.
SaaS products need secure foundations so that CIOs and CISOs can design successful and productive applications that mitigate risk for the organization.
Improper data management and access practices are “the business world’s second-hand cigarette smoke,” writes Scott Vaughan, who offers tips to avoid this scenario.
Multi-cloud deployment is a focused way to solve the problem of backup failures while adding resilience to services, says CISO Robert Wood.
Frank Domizio covers four features of data backup and recovery software, and why they’re essential to protect against disasters, ransomware, and other incidents.
AI is increasingly mainstream, so it’s more important than ever to make sure that all organizations implement smart, unbiased security protocols.
Sensitive data is increasingly being filtered through SaaS solutions, which makes securing them more important than ever, says Robert Wood.
Cloud costs need active management; Palantir and Cloudflare are working together to help companies address that requirement.
Do you know how to respond after a security breach has happened? This “for CISO, by CISO” guidebook provides first-person actionable insights from practitioners.
In this Cloud Wars Expo Industry Cloud Battleground Moment, Carrie Tharp explains how Google Cloud emphasizes security and privacy in the hospitality industry.
CDO & Practitioner Analyst Wayne Sadin digs deep into the Bible of sustainability to discuss how companies should handle greenhouse gas emissions and the interplay between data and sustainability.
The capabilities of Snyk for automatic discovery & remediation have positioned it to shift security left. However, vendor solutions only go so far.
A sustainable future is not out of reach but depends on how we continue efforts to build resilient cybersecurity frameworks which support the critical infrastructures, IoT, and open-source solutions we all depend on.
Frank shares a few essential ways to get the right people, set the ground rules, and stay informed so you can successfully navigate your breach response.