featureTeams, Slack, and GitHub, oh my! – How collaborative tools can create a security nightmareSome of today’s most popular and useful information-sharing platforms can leave a lot to be desired from a security standpoint. Here are some of the issues and how to mitigate them.By Susan Bradley19 Mar 20247 minsWindows SecurityApplication SecurityCloud Security news analysis Attackers abuse cloud accounts to spawn thousands of crypto CDN nodesBy Lucian Constantin13 Mar 20244 minsCryptocurrencyCyberattacksCloud Securitynews Google’s Security Command Center Enterprise fills gaps across cloud security lifecycleBy Sascha Brodsky12 Mar 20244 minsThreat and Vulnerability ManagementCloud Security newsIdentity hacking saw sharp rise 2023By John Mello Jr. 22 Feb 20244 minsIdentity TheftIncident ResponseCloud Security newsVisibility, alarm fatigue top remediation concerns in cloud securityBy Jon Gold 14 Feb 20243 minsSecurity Operations CenterCloud Security featureIs your cloud security strategy ready for LLMs?By Evan Schuman 08 Feb 20247 minsGenerative AICloud Security news analysisCloud squatting: How attackers can use deleted cloud assets against youBy Lucian Constantin 15 Dec 20237 minsCloud SecurityVulnerabilities featureAccenture takes an industrialized approach to safeguarding its cloud controlsBy Aimee Chanthadavong 11 Dec 20238 minsApplication SecurityCloud SecurityCompliance news analysisCisco unveils AI-powered assistants to level up security defensesBy Rosalyn Page 05 Dec 20235 minsEncryptionCloud Security ArticlesnewsAmazon’s AWS Control Tower aims to help secure your data’s bordersAs digital compliance tasks and data sovereignty rules get ever more complicated, Amazon wants automation to help.By Jon Gold 28 Nov 2023 3 minsRegulationCloud SecuritynewsCohesity taps Amazon for generative AI, cloud-based securityThe cloud-based data management provider said today that its many of its generative AI features will soon be available on Amazon Bedrock.By Jon Gold 13 Nov 2023 3 minsGenerative AICloud SecurityData and Information SecurityfeatureKeep it secret, keep it safe: the essential role of cybersecurity in document managementUntold quantities of sensitive data reside in the huge variety of documents that accumulate over the lifetime of an organization. Keeping them safe no matter where they’re stored should be a top priority.By Linda Rosencrance 08 Nov 2023 8 minsCSO and CISOCloud SecurityData and Information SecuritynewsMost cloud moves found rushed as adopters underrate associated risks: ReportMore than half of security leaders surveyed didn’t understand the security risks associated with shifting to the cloud. By Shweta Sharma 06 Nov 2023 4 minsCloud SecurityfeatureHow to choose the best cloud security posture management toolsWith hybrid multicloud environments becoming prevalent across all industries, it pays to invest in the right CSPM tools to minimize risk, protect cloud assets, and manage compliance.By Linda Rosencrance 30 Oct 2023 8 minsThreat and Vulnerability ManagementCloud SecurityData and Information SecuritybrandpostSponsored by Palo Alto NetworksCrucial insights for executives on CNAPPWith CNAPPs, a single platform can protect applications at runtime while also integrating security into development workflows to identify and fix flaws early in the application lifecycle.By Zachary Malone, SE Academy Manager, Palo Alto Networks 24 Oct 2023 5 minsCloud SecuritynewsLacework adds multiple extensions to its multicloud security platformThe platform is extending support on its CSPM, APA and vulnerability management offerings. By Shweta Sharma 24 Oct 2023 3 minsCloud SecuritynewsPalo Alto Networks updates Prisma Cloud with integrated cloud securityWith the new code-to-cloud intelligence capabilities, Prisma Cloud aims to create a single point of security control for all cloud-native workflows.By Shweta Sharma 19 Oct 2023 3 minsCloud Securityopinion5 practical recommendations implementing zero trustConsider this advice to successfully replace a perimeter approach to security with a zero trust framework.By Michelle Drolet 10 Oct 2023 6 minsZero TrustCloud SecurityNetwork SecuritybrandpostSponsored by Palo Alto NetworksThe advantages and risks of large language models in the cloudUnderstanding the pros and cons of LLMs in the cloud is a step closer to optimized efficiency—but be mindful of security concerns along the way. By Daniel Prizmant, Senior Principal Researcher at Palo Alto Networks 03 Oct 2023 5 minsCloud SecuritynewsSysdig unveils cloud attack graph based on real-time threat dataSysdig also announced a new cloud inventory and agentless scanning capabilities to tackle cloud security risks.By Michael Hill 27 Sep 2023 3 minsThreat and Vulnerability ManagementCloud SecurityStorage Securityfeature6 notable API security initiatives launched in 2023API security is climbing the agenda for organizations and the wider cybersecurity community. Here are six initiatives rolled out in 2023 that tackle API security issues.By Michael Hill 19 Sep 2023 7 minsApplication SecurityCloud SecuritySecurity Practices Show more Show less View all Resources whitepaper Data Protection in a Multicloud World Data protection challenges resulting in disruption are on the rise with public clouds and cyberattacks the leading areas of concern. Organizations that continue to modernize data protection can minimize risk and raise confidence levels The post Data Protection in a Multicloud World appeared first on Whitepaper Repository –. By Dell Technologies 18 May 2023Cloud SecurityData and Information SecurityMulti Cloud whitepaper The Long Road Ahead to Ransomware Preparedness By Dell Technologies 17 May 2023Cloud SecurityRansomwareSecurity View all Video on demand videoHoneypots and the evolution of botnets | Salted Hash Ep 23Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm’s recent honeypot research, which gathered information showing how the bot landscape is evolving. 20 Apr 2018 12 minsAdvanced Persistent ThreatsFirewallsBackup and Recovery DJI’s bounty problems and video surveillance programs | Salted Hash Ep 13 08 Jan 2018 21 minsData BreachHackingApplication Security Zero Trust networks and enterprise security strategy | Salted Hash Ep 12 18 Dec 2017 26 minsCloud SecurityCloud ComputingSecurity The latest on Azure Stack, cyberattacks, the next iPhone and … keyboards 20 Jul 2017 41 minsAppleMicrosoftSmartphones See all videos Explore a topic Application Security Business Continuity Business Operations Careers Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news AT&T suffers critical breach impacting 73 million customers By Shweta Sharma 01 Apr 20244 mins Data Breach feature Recruit for diversity: Practical ways to remove bias from the hiring process By Aimee Chanthadavong 01 Apr 20248 mins Careers feature The CSO guide to top security conferences By CSO Staff 01 Apr 202417 mins Technology IndustryIT SkillsEvents podcast CSO Executive Sessions: 2024 International Women's Day special 13 Mar 202410 mins CSO and CISO podcast CSO Executive Sessions: Former convicted hacker Hieu Minh Ngo on blindspots in data protection 20 Feb 202421 mins CSO and CISO podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video CSO Executive Sessions: Geopolitical tensions in the South China Sea – why the private sector should care 01 Apr 202416 mins CSO and CISO video CSO Executive Sessions: 2024 International Women's Day special 13 Mar 202410 mins CSO and CISO video LockBit feud with law enforcement feels like a TV drama 05 Mar 202456 mins RansomwareArtificial Intelligence