Cloud Security

  • The high price of careless cloud app usage
    Cloud Security May 11, 2022 4 min

    The high price of careless cloud app usage

    If you believe internal attacks are caused only by malicious insiders, think again. According to a Ponemon Institute report from 2022, employee negligence is responsible for 56% of insider threats...

    Read more 
  • CASBs for multi-cloud
    Cloud Security Apr 25, 2022 4 min

    CASBs for multi-cloud

    Security is a big issue IT teams face when it comes to multi-cloud management. A cloud access security broker (CASB) provides organizations with a much-needed opportunity to harden security across cloud-based applications.

    Read more 
  • Shedding light on shadow IT and data exfiltration with CASB
    Cloud Security Apr 04, 2022 5 min

    Shedding light on shadow IT and data exfiltration with CASB

    The days when employees and assets functioned only within the company network are long gone. Now, all that is required is a username and password to utilize the required IT resources from a remote location.

    Read more 
  • Decoding the Cloud Security Alliance's Cloud Controls Matrix
    Cloud Security Mar 10, 2022 5 min

    Decoding the Cloud Security Alliance's Cloud Controls Matrix

    With organizations adopting cloud technology, cloud security has become a top concern. Many industrial regulations and laws mandate the implementation of security controls in the cloud.

    Read more 
  • 8-cloud-security-tips-you-should-not-ignore
    Cloud Security Feb 10, 2022 4 min

    8 cloud security tips you shouldn't ignore

    The cloud is quickly replacing traditional on-premises data centers but the trade-off is that you rely much more heavily on cloud providers to handle the security of your hardware and data.

    Read more 
  • why-cloud-access-security-broker-should-be-part-of-siem
    Cloud Security Feb 10, 2022 4 min

    Why a cloud access security broker should be part of your SIEM

    The analyst firm Gartner first defined the phrase "cloud access security broker," or CASB, in 2012. It has become a well-known and well-adopted technology for cyberdefense. You can think of

    Read more 
  • why-casb-img-thumb
    Cloud Security Dec 16,2021 4 min

    Why CASB should be on your priority list while migrating to cloud

    The global growth of cloud infrastructure has been explosive. The pandemic that promoted remote working models has accelerated the adoption of cloud infrastructure platforms and services exponentially.

    Read more 
  • img-what-is-casb-thumb
    Cloud Security Dec 16,2021 5 min

    What is a CASB, and where does it fit in your cybersecurity strategy?

    When shifting to the cloud, organizations need to ensure that cloud applications can be accessed only by authorized users. As your network perimeter changes

    Read more 
  • risks-and-mitigation-img-thumb
    Cloud Security Dec 14,2021 3 min

    What is shadow IT? | Risks and mitigation

    Shadow IT refers to the use of any application, device, or cloud service in an organization without explicit approval from the IT department.

    Read more 
  • role-of-casb-in-cybersecurity
    Cloud Security Dec 9,2021 4 min

    The role of a CASB in cybersecurity: An indispensable component to your security posture

    Digital transformation is on a steady climb, especially since the global pandemic. With remote work redefining parameters

    Read more 
  • Cloud Security Mar 7,2021 4 min

    Spotting and stopping cloud attacks: SSH Linux attacks on AWS

    Cloud infrastructures are primarily dominated by Linux-based machines, owing to advantages such as lower costs

    Read more 
  • Cloud Security Mar 7,2021 4 min

    Spotting and stopping cloud attacks: AWS server hack

    In March 2020, Sophos published a report on a sophisticated attack carried out on various Linux and Windows..

    Read more 
  • Cloud Security Mar 7,2021 2 min

    Spotting and stopping cloud attacks

    Organizations are shifting their IT infrastructure from on-premises to the cloud to gain advantages in cost, productivity, and uptime.

    Read more 

Get the latest content delivered
right to your inbox!

Thank you for subscribing.

You will receive regular updates on the latest news on cybersecurity.

  • Please enter a business email id
  •  
  •  
    By Keep me Updated you agree to processing of personal data according to the Privacy Policy.

EXPERT TALKS

     
     

© 2022 Zoho Corporation Pvt. Ltd. All rights reserved.