The average cost of a data breach reached an all-time high of $4.35 million this year, according to newly published 2022 Cost of a Data Breach Report, an increase of…
Browsing CategoryCloud Security
5 Essential Steps for Every Ransomware Response Plan
This post was written with contributions from Andrew Gorecki, Camille Singleton and Charles DeBeck. May and June bring warm weather, backyard barbecues and, in recent years, an uptick in ransomware…
Securing Cloud Technology in a Growing Threat Landscape
Cloud technologies are becoming more and more popular. Many companies shifted their workloads and their IT infrastructures into the cloud. The advantages are clear: more flexibility and scalability, less admin…
Is 2022 the Year of Secure Access Service Edge?
In 2022, nearly 60% of U.S. workers (whose work can be done remotely) work from home all or most of the time. Remote work coupled with the explosion of apps,…
Cloud Native Application Protection Platform: A Utility Knife for Cloud Security Services
Does the world need another acronym? Probably not. But it seems like one is born every day in the cybersecurity market. As a tradeoff for the brain power to recall…
How to Create Identity and Access Governance In and Across Clouds
In March 2021, we posted a three-part series about whether cloud-native identity and access management (IAM) controls are good enough for an enterprise. Many of the points we raised at…
Avoiding the Unintended Consequences of Strict Cybersecurity Policies
Does the left hand know what the right hand is doing? Or does even the left pinky know what the left ring finger is doing? Problems can easily arise when…
Modern Identity and Access Management Makes a Difference, Especially at a Mega-Scale
As businesses embrace more remote users and a hybrid work model, managing user identity and access is more important than ever. Add authentication for millions of third parties and non-employees,…
One Small Error by DevOps, One Giant Opening for Attackers
When you look at breach statistics in today’s cloud-dominated IT world, you can see several examples where a small error made by the DevOps or CloudOps team has led to…
Electron Application Attacks: No Vulnerability Required
While you may have never heard of “Electron applications,” you most likely use them. Electron technology is in many of today’s most popular applications, from streaming music to messaging to…