Subscribe to our Newsletter

3 best practices for cloud security monitoring

As powerful as the cloud may be, it’s not magic. If you have a problem before you transition to the cloud, it won’t… just go away once you make the switch. Cloud... Read more »

How to conduct proper AWS vulnerability scanning in 3 steps

AWS provides a set of security controls to protect its own infrastructure, but it’s important to be aware that… the security of the individual servers is the responsibility of the client —... Read more »

Understanding the CSA Cloud Controls Matrix and CSA CAIQ

The cloud has been — and continues to be — a challenge area for many security teams. It’s a continual struggle… to validate and onboard new providers, particularly given the rapid pace... Read more »

The differences between web roles and worker roles in Azure

the cloud without managing the servers themselves. When working with the cloud platform, there are two Azure service roles on which an application can be installed: web roles or worker roles. The... Read more »

Cloud security quiz: Application security best practices

Today, it’s the rare organization that hosts all its applications on premises. The emergence of cloud applications has helped companies of all shapes and sizes reduce costs, improve collaboration and ensure scalability.... Read more »

Cloud computing security technology quiz

olegusk – stock.adobe.com By Whether it’s deploying cloud security services to better protect systems and data, or using cloud workloads to improve accessibility, scalability, communication and collaboration between employees and partners, the... Read more »

software-defined perimeter (SDP)

The software-defined perimeter, or SDP, is a security framework that controls access to resources based on identity. By establishing a perimeter via software versus hardware, an SDP hides an organization’s infrastructure —... Read more »

cloud access security broker (CASB)

A cloud access security broker (CASB) is a software tool or service that sits between an organization’s on-premises infrastructure and a cloud provider’s infrastructure. CASBs are available as both an on-premises or... Read more »

Try this cloud identity and access management quiz

The business and technological impacts of the COVID-19 pandemic continue to reverberate around the world. As shutdowns loomed, organizations hurriedly rolled out remote work amid steadily increasing cloud adoption trends — and... Read more »

What are cloud containers and how do they work?

Cloud containers remain a hot topic in the IT world in general, especially in security. The world’s top technology companies, including Microsoft, Google and Facebook, all use them. For example, Google said... Read more »