Cloud

Explore the latest advancements in security technology and best practices designed to protect cloud-based data, networks, applications, and systems. Stay up to date with cutting-edge solutions for securing cloud infrastructures, ensuring data privacy, and safeguarding against cyber threats.

  • Zero Trust: Can It Be Implemented Outside the Cloud?

    Only cloud service providers are getting cybersecurity right, and the implications for the future of IT are enormous.


  • Top 10 Cloud Access Security Broker (CASB) Solutions

    Compare the top cloud access security broker (CASB) solutions to ensure your cloud environments are secure.


  • SPanel: Taking Website Security to the Next Level

    SPanel is a web hosting environment that takes website security seriously. Learn more about the platform now.


  • One in Five Public-Facing Cloud Storage Buckets Expose Sensitive Data

    Public-facing cloud storage buckets are a data privacy nightmare, according to a study released today. Members of Laminar Labs’ research team recently found that one in five public-facing cloud storage buckets contains personally identifiable information (PII) – and the majority of that data isn’t even supposed to be online in the first place. The information…


  • MSSPs Fare Well in First MITRE Evaluations

    If MITRE Engenuity’s new MSSP evaluations are any indication, managed security service providers are a little like children from Lake Wobegon: They’re all above average. Of the 15 MSSPs that participated in MITRE’s first-ever security services testing, only three failed to report attack techniques in all 10 of the evaluation steps, and in two of…


  • Cloud Security: The Shared Responsibility Model

    Cloud security builds off of the same IT infrastructure and security stack principles of a local data center. However, a cloud vendor offering provides a pre-packaged solution that absorbs some operational and security responsibilities from the customer. Exactly which responsibilities the cloud vendor absorbs depends upon the type of solution. While cloud security offerings provide…


  • Top Network Detection & Response (NDR) Solutions

    In the race to offer comprehensive cybersecurity solutions, the product known as network detection and response (NDR) is a standalone solution as well as a central component of XDR. Whereas older solutions like antivirus, firewalls, and endpoint detection and response (EDR) have long focused on threats at the network perimeter, the intent of NDR is…


  • CISA Urges Exchange Online Authentication Update

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is recommending that government agencies and private organizations that use Microsoft’s Exchange cloud email platform migrate users and applications to Modern Auth before Basic Auth is deprecated in October. CISA noted that Basic authentication is simple and pretty convenient but unsecured by design. It’s relatively easy for…


  • Microsoft 365 Research Highlights Cloud Vulnerabilities

    In a sequence that suggests cloud services may be more vulnerable than many think, Proofpoint researchers have demonstrated how hackers could take over Microsoft 365 accounts to ransom files stored on SharePoint and OneDrive. Microsoft services are widely used in enterprises for cloud-based collaboration, and the Proofpoint research report revealed that cloud infrastructures are not…


  • How to Improve SD-WAN Security: 3 SD-WAN Best Practices

    As the modern workforce becomes increasingly mobile and enterprises branch out and grow, software-defined wide area networks (SD-WAN) have become a popular choice in the evolution of networking. By applying the benefits of software-defined networking (SDN) to traditional hardware-centric networks, SD-WAN offers enterprises improved flexibility, scalability, performance, and agility for today’s virtual, edge, branch and…



Get the free newsletter

Subscribe to Cybersecurity Insider for top news, trends & analysis

This field is required This field is required

Top Cybersecurity Companies