Organizations must grapple with challenges from various market forces. Digital transformation, cloud adoption, hybrid work environments and geopolitical and economic challenges all have a part to play. These forces have…
Browsing CategoryCloud Security
How Posture Management Prevents Catastrophic Cloud Breaches
We’ve all heard about catastrophic cloud breaches. But for every cyberattack reported in the news, many more may never reach the public eye. Perhaps worst of all, a large number…
How to Implement Cloud Identity and Access Governance
Creating identity and access governance across cloud environments is crucial for modern organizations. In our previous post, we discussed how important human and non-human identities are for these environments and…
Containers, Security, and Risks within Containerized Environments
Applications have historically been deployed and created in a manner reminiscent of classic shopping malls. First, a developer builds the mall, then creates the various stores inside. The stores conform…
Securing Your SAP Environments: Going Beyond Access Control
Many large businesses run SAP to manage their business operations and their customer relations. Security has become an increasingly critical priority due to the ongoing digitalization of society and the…
How Do You Plan to Celebrate National Computer Security Day?
In October 2021, the world marked the 18th Cybersecurity Awareness Month. October might be over, but employers can still talk about awareness of digital threats. We all have another chance before…
Why Are Cloud Misconfigurations Still a Major Issue?
Cloud misconfigurations are by far the biggest threat to cloud security, according to the National Security Agency (NSA). The 2022 IBM Security X-Force Cloud Threat Landscape Report found that cloud…
Charles Henderson’s Cybersecurity Awareness Month Content Roundup
In some parts of the world during October, we have Halloween, which conjures the specter of imagined monsters lurking in the dark. Simultaneously, October is Cybersecurity Awareness Month, which evokes…
3 Keys to an Effective Enterprise IT Risk Management Strategy
The average cost of a data breach hit a record high of $4.35 million, a 13% increase in the last two years, according to the 2022 Cost of a Data…
How IBM Secured the 2022 US Open
Throughout the US Open Tennis Championship, the infrastructure for USOpen.org and the mobile apps can see upwards of 3 million security events. While the vast majority of events are not…