feature8 cloud security gotchas most CISOs missWith the typical enterprise today leveraging a dozen cloud vendors globally, there are plenty of ways for security nightmares to sneak in. Here are a few lesser-known issues that could haunt you.By Evan Schuman21 Aug 202411 minsCloud Security feature How CISOs can tackle the pernicious problem of poisoned packagesBy Cynthia Brumfield20 Aug 20248 minsDevSecOpsCloud SecuritySecurity Practicesnews S3 shadow buckets leave AWS accounts open to compromiseBy Lucian Constantin08 Aug 20247 minsCloud SecurityVulnerabilities newsBlack Hat: Latest news and insightsBy CSO Staff 08 Aug 20244 minsAdvanced Persistent ThreatsWindows SecurityThreat and Vulnerability Management news analysisAPT groups increasingly attacking cloud services to gain command and controlBy Lucian Constantin 07 Aug 20246 minsAdvanced Persistent ThreatsHacker GroupsHacking newsBlack Hat preview: AI and cloud security take center stageBy John Leyden 06 Aug 20245 minsWindows SecurityCloud SecurityData and Information Security feature6 hot cybersecurity trends — and 2 going coldBy Neal Weinberg 06 Aug 202411 minsPasswordsRansomwarePhishing feature7 top cloud security threats — and how to address themBy John Edwards 31 Jul 20248 minsCloud SecurityCloud ComputingSecurity newsSAP security holes raise questions about the rush to AIBy Evan Schuman 18 Jul 20245 minsCloud Security ArticlesopinionBeware the tools that can bring risk to a Windows networkVigilance and regular reviews of network assets and policies can help avoid attacks that take advantage of access points created by legacy software and moves into the cloud. By Susan Bradley 18 Jul 2024 8 minsNetwork AdministratorWindows SecurityCloud SecuritynewsBaffle to offer tenant-level data encryption to AWS usersBaffle has integrated homegrown key management capability with AWS server-side encryption, allowing SaaS applications to isolate and encrypt data at the customer level.By Shweta Sharma 17 Jul 2024 3 minsEncryptionCloud SecuritynewsGoogle eyes security startup Wiz for $23B in its largest-ever acquisitionThe deal could face a lot of regulatory hurdles, according to analysts.By Gyana Swain 15 Jul 2024 5 minsTechnology IndustryCloud SecurityfeatureSoftware supply chain still dangerous despite a slew of effortsWhile recent efforts promise a more secure future for software, experts say several challenges could still vex organizations as they try to improve software security.By Cynthia Brumfield 10 Jul 2024 10 minsCloud SecuritySecurity PracticesSupply ChainfeatureTop 12 cloud security certificationsCloud security certifications can give your career a boost. Covering rapidly evolving technologies such as AI, market challengers such as Alibaba Cloud, and areas previously overlooked, these are your best bets.By Eric Frank 28 Jun 2024 14 minsCertificationsIT SkillsCloud SecuritynewsOrca bolsters cloud security offering with source code supportNew capabilities are designed to improve visibility into source code repositories within GitHub, and GitLab.By Shweta Sharma 26 Jun 2024 3 minsCloud SecuritySecurity SoftwarenewsCloud security faces pressure from AI growth, multicloud useCloud computing and storage are essential drivers of modern business, but its rapid adoption at a huge scale has also brought with it new security challenges to the front. By Maneesha Tiwari 26 Jun 2024 5 minsCloud SecuritynewsTata Communications partners with Versa Networks on hosted SASEHybrid work, SD-WAN, and digital-first adoption make enterprises more vulnerable to attack, increasing the need for SSE solutions, the company says.By Lynn Greiner 21 Jun 2024 3 minsCloud SecurityNetwork Securityhow-toDownload our cloud security posture management (CSPM) buyer’s guideWith hybrid multicloud environments becoming prevalent across all industries, it pays to invest in the right cloud security posture management (CSPM) tools to minimize risk, protect cloud assets (apps and data), and manage compliance.By Linda Rosencrance 20 Jun 2024 1 minCloud SecurityEnterprise Buyer’s GuidesbrandpostSponsored by CrowdstrikeHow to achieve multi-cloud security at the speed of DevOps Modern cloud security requires a complete CNAPP with unified visibility and threat protection across the entire cloud estate to stop cloud breaches.By Paul Desmond 20 Jun 2024 4 minsCloud SecuritynewsHow AWS secures its infrastructure with SonarisWith Sonaris, an internally developed tool, AWS continuously monitors its systems to pre-empt attacks on customer data.By Shweta Sharma 20 Jun 2024 1 minCloud SecurityNetwork SecurityfeatureCCSP certification: Exam, cost, requirements, training, salaryThe Certified Cloud Security Professional (CCSP) is a cloud-focused security credential that can advance your career as a cybersecurity pro. Here are the details you need to know.By Josh Fruhlinger 18 Jun 2024 8 minsCertificationsIT SkillsCloud Security Show more Show less View all Resources whitepaper Best Practices in Cybersecurity and Cyber Resilience In today’s digital world, consumers and employees expect organizations of all types and sizes to operate without interruption. In fact, contractual obligations and service level agreements demand it. The post Best Practices in Cybersecurity and Cyber Resilience appeared first on Whitepaper Repository –. By Cohesity Inc. 26 Aug 2024Business OperationsCybercrimeData and Information Security whitepaper Cyber resilience in the ransomware era By Cohesity Inc. 26 Aug 2024Business OperationsCybercrimeSecurity whitepaper Unlock the power of AI and ML for data protection By Cohesity Inc. 26 Aug 2024Artificial IntelligenceBusiness OperationsMachine Learning View all Video on demand videoHoneypots and the evolution of botnets | Salted Hash Ep 23Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm’s recent honeypot research, which gathered information showing how the bot landscape is evolving. 20 Apr 2018 12 minsAdvanced Persistent ThreatsFirewallsBackup and Recovery DJI’s bounty problems and video surveillance programs | Salted Hash Ep 13 08 Jan 2018 21 minsData BreachHackingApplication Security Zero Trust networks and enterprise security strategy | Salted Hash Ep 12 18 Dec 2017 26 minsCloud SecurityCloud ComputingSecurity The latest on Azure Stack, cyberattacks, the next iPhone and … keyboards 20 Jul 2017 41 minsAppleMicrosoftSmartphones See all videos Explore a topic Application Security Business Continuity Business Operations Careers Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos feature How to ensure cybersecurity strategies align with the company’s risk tolerance By Rosalyn Page 03 Sep 202410 mins CSO and CISORisk Management news North Korean hackers actively exploited a critical Chromium zero-day By Shweta Sharma 02 Sep 20243 mins Zero-day vulnerability feature Ransomware recovery: 8 steps to successfully restore from backup By Maria Korolov 02 Sep 202417 mins RansomwareMalwareBackup and Recovery podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO video CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins RansomwareZero TrustCloud Security video CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience 10 Jul 202424 mins CSO and CISO