cloud security, cloud, cloud environment, data privacy, data protection, cloud security teams, security, cloud-native, Palo Alto Dell zero trust Network Security multi-cloud zero-trustQualys multi-cloud Wi-Fi 6 access point zero-trust cloud security remote data protection

Securing the Future: Navigating the Complexities of Cloud Security

Cloud environments are complex, and can create a difficult territory for security and IT teams to monitor and comprehend ...
Security Boulevard

Top Ten NSA and CISA Cloud Security Strategies

NSA and CISA release a  joint guide outlining ten pivotal cloud security strategies for enterprise In a business world dominated by cloud-based solutions, robust cloud security strategies for cloud environments have never ...

Alyssa Miller: Charting the Course Through InfoSec and Aviation

In this episode, special guest Alyssa Miller joins the hosts for an insightful and entertaining conversation covering a broad range of topics from social engineering anecdotes involving Kevin Johnson to Alyssa’s journey ...

Cloud Repatriation Impacts on Resources and Cybersecurity

The cloud repatriation surge and the impact on SOS resources and business cybersecurity  In recent years, the cloud computing landscape has witnessed a significant yet somewhat surprising trend: cloud repatriation.   This movement ...

FedRAMP ATO Prioritization for Generative AI Cloud Solutions

| | AI, ATO, Blog, Cloud, FedRAMP
The US Government is continuing to move rapidly to ensure US competitiveness in the area of Artificial Intelligence (AI). The FedRAMP Program Management Office (PMO) published the Emerging Technology Prioritization Framework (ETPF) ...
zero-trust encrypted AI Trend Micro cybersecurity poverty line, data-centric, SUSE cloud Wiz Torq AirTag Skyhawk SASE security cloud security visibility PwC Survey Finds C-Level Execs Now View Cybersecurity as Biggest Risk

You Can’t Stop What You Can’t See: Addressing Encrypted Cloud Traffic

Forget AI. The most immediate and threatening cybersecurity challenge is visibility into an organization’s encrypted cloud traffic ...
Security Boulevard
Security Flaw in CoCalc: One Click and Your Cloud is Ruined

Security Flaw in CoCalc: One Click and Your Cloud is Ruined

TL;DR Imperva Threat Research discovered and reported a security flaw in the CoCalc Cloud environment. The flaw enabled potential attackers to completely take over a target’s account with only a single click ...

Maintaining Control and Visibility in Hybrid Environments

The challenges and solutions to maintaining control and visibility in hybrid environments  Many organizations have transitioned to hybrid and multi-cloud deployments, with tens of thousands more businesses on the way. This shift, ...
AndroxGh0st malware cloud CISA FBI

Hackers Building AndroxGh0st Botnet to Target AWS, O365, Feds Warn

The bad actors behind the Androxgh0st malware are building a botnet they can use to identify victims and exploit vulnerable networks to steal confidential information from such high-profile cloud applications as Amazon ...
Security Boulevard
workload risk of AI, Kubernetes, cloud, multi-cloud, security, organizations cloud security Workload Protection Transforming Cybersecurity Hybrid Cloud

Understanding Cloud Workload Protection: Technologies and Best Practices

Implementing cloud workload protection strategies is essential for any organization utilizing cloud services. Here's what you need to know ...
Security Boulevard