feature8 cloud security gotchas most CISOs missWith the typical enterprise today leveraging a dozen cloud vendors globally, there are plenty of ways for security nightmares to sneak in. Here are a few lesser-known issues that could haunt you.By Evan Schuman21 Aug 202411 minsCloud Security feature How CISOs can tackle the pernicious problem of poisoned packagesBy Cynthia Brumfield20 Aug 20248 minsDevSecOpsCloud SecuritySecurity Practicesnews S3 shadow buckets leave AWS accounts open to compromiseBy Lucian Constantin08 Aug 20247 minsCloud SecurityVulnerabilities newsBlack Hat: Latest news and insightsBy CSO Staff 08 Aug 20244 minsAdvanced Persistent ThreatsWindows SecurityThreat and Vulnerability Management news analysisAPT groups increasingly attacking cloud services to gain command and controlBy Lucian Constantin 07 Aug 20246 minsAdvanced Persistent ThreatsHacker GroupsHacking newsBlack Hat preview: AI and cloud security take center stageBy John Leyden 06 Aug 20245 minsWindows SecurityCloud SecurityData and Information Security feature6 hot cybersecurity trends — and 2 going coldBy Neal Weinberg 06 Aug 202411 minsPasswordsRansomwarePhishing feature7 top cloud security threats — and how to address themBy John Edwards 31 Jul 20248 minsCloud SecurityCloud ComputingSecurity newsSAP security holes raise questions about the rush to AIBy Evan Schuman 18 Jul 20245 minsCloud Security ArticlesopinionBeware the tools that can bring risk to a Windows networkVigilance and regular reviews of network assets and policies can help avoid attacks that take advantage of access points created by legacy software and moves into the cloud. By Susan Bradley 18 Jul 2024 8 minsNetwork AdministratorWindows SecurityCloud SecuritynewsBaffle to offer tenant-level data encryption to AWS usersBaffle has integrated homegrown key management capability with AWS server-side encryption, allowing SaaS applications to isolate and encrypt data at the customer level.By Shweta Sharma 17 Jul 2024 3 minsEncryptionCloud SecuritynewsGoogle eyes security startup Wiz for $23B in its largest-ever acquisitionThe deal could face a lot of regulatory hurdles, according to analysts.By Gyana Swain 15 Jul 2024 5 minsTechnology IndustryCloud SecurityfeatureSoftware supply chain still dangerous despite a slew of effortsWhile recent efforts promise a more secure future for software, experts say several challenges could still vex organizations as they try to improve software security.By Cynthia Brumfield 10 Jul 2024 10 minsCloud SecuritySecurity PracticesSupply ChainfeatureTop 12 cloud security certificationsCloud security certifications can give your career a boost. Covering rapidly evolving technologies such as AI, market challengers such as Alibaba Cloud, and areas previously overlooked, these are your best bets.By Eric Frank 28 Jun 2024 14 minsCertificationsIT SkillsCloud SecuritynewsOrca bolsters cloud security offering with source code supportNew capabilities are designed to improve visibility into source code repositories within GitHub, and GitLab.By Shweta Sharma 26 Jun 2024 3 minsCloud SecuritySecurity SoftwarenewsCloud security faces pressure from AI growth, multicloud useCloud computing and storage are essential drivers of modern business, but its rapid adoption at a huge scale has also brought with it new security challenges to the front. By Maneesha Tiwari 26 Jun 2024 5 minsCloud SecuritynewsTata Communications partners with Versa Networks on hosted SASEHybrid work, SD-WAN, and digital-first adoption make enterprises more vulnerable to attack, increasing the need for SSE solutions, the company says.By Lynn Greiner 21 Jun 2024 3 minsCloud SecurityNetwork Securityhow-toDownload our cloud security posture management (CSPM) buyer’s guideWith hybrid multicloud environments becoming prevalent across all industries, it pays to invest in the right cloud security posture management (CSPM) tools to minimize risk, protect cloud assets (apps and data), and manage compliance.By Linda Rosencrance 20 Jun 2024 1 minCloud SecurityEnterprise Buyer’s GuidesbrandpostSponsored by CrowdstrikeHow to achieve multi-cloud security at the speed of DevOps Modern cloud security requires a complete CNAPP with unified visibility and threat protection across the entire cloud estate to stop cloud breaches.By Paul Desmond 20 Jun 2024 4 minsCloud SecuritynewsHow AWS secures its infrastructure with SonarisWith Sonaris, an internally developed tool, AWS continuously monitors its systems to pre-empt attacks on customer data.By Shweta Sharma 20 Jun 2024 1 minCloud SecurityNetwork SecurityfeatureCCSP certification: Exam, cost, requirements, training, salaryThe Certified Cloud Security Professional (CCSP) is a cloud-focused security credential that can advance your career as a cybersecurity pro. Here are the details you need to know.By Josh Fruhlinger 18 Jun 2024 8 minsCertificationsIT SkillsCloud Security Show more Show less View all Resources whitepaper Real-Time, All the Time: Fuelling AI success through a continuous data stream With AI dominating conversations everywhere, practitioners and executives are seeking answers: How to succeed with GenAI? Delivering on AI initiatives requires the right strategy, platform and data stack. The post Real-Time, All the Time: Fuelling AI success through a continuous data stream appeared first on Whitepaper Repository –. By StreamSets 26 Aug 2024Artificial IntelligenceData and Information SecurityData Management whitepaper 2023 GigaOm Radar Report on Autonomous Security Operation Center (SOC) Solutions [XSIAM] By Palo Alto Networks 11 Jul 2024Artificial IntelligenceSecuritySecurity Software whitepaper XSIAM E-Book: Machine-Led, Human-Empowered Platform By Palo Alto Networks 11 Jul 2024SecuritySecurity InfrastructureSecurity Operations Center View all Video on demand videoCSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safeBryan Woodworth – Director of Solution Strategy at Aviatrix – joins Xiou Ann Lim for this CSO Executive Sessions interview. They talk about safeguarding the Olympics from cyber threats, operational technology and IoT considerations for critical infrastructure, and more. 07 Aug 2024 17 minsRansomwareZero TrustCloud Security Honeypots and the evolution of botnets | Salted Hash Ep 23 20 Apr 2018 12 minsAdvanced Persistent ThreatsFirewallsBackup and Recovery DJI’s bounty problems and video surveillance programs | Salted Hash Ep 13 08 Jan 2018 21 minsData BreachHackingApplication Security Zero Trust networks and enterprise security strategy | Salted Hash Ep 12 18 Dec 2017 26 minsCloud SecurityCloud ComputingSecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos feature How to ensure cybersecurity strategies align with the company’s risk tolerance By Rosalyn Page 03 Sep 202410 mins CSO and CISORisk Management news North Korean hackers actively exploited a critical Chromium zero-day By Shweta Sharma 02 Sep 20243 mins Zero-day vulnerability feature Ransomware recovery: 8 steps to successfully restore from backup By Maria Korolov 02 Sep 202417 mins RansomwareMalwareBackup and Recovery podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO video CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience 10 Jul 202424 mins CSO and CISO video CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO