How the CIS Foundations Benchmarks Are Key to Your Cloud Security

Many organizations are migrating their workloads to the cloud. But there are challenges along the way. Specifically, security leaders are concerned about their ability to protect their cloud-based data using secure configurations. Tripwire found this o… Continue reading How the CIS Foundations Benchmarks Are Key to Your Cloud Security

Critical Chrome Cyber Bugs: Update NOW

Google Chrome has a bunch of bugs, some of which might pwn your PC or Mac. Go get the update.
The post Critical Chrome Cyber Bugs: Update NOW appeared first on Security Boulevard.
Continue reading Critical Chrome Cyber Bugs: Update NOW

Cyber Hygiene: Boosting Your Security Posture

It has been two years since Equifax announced a data breach that exposed the financial records of more than 147 million people, and the news continues to dominate the headlines. After two years of investigation and negotiations, the company finally ag… Continue reading Cyber Hygiene: Boosting Your Security Posture

Cloud Security a Shared Responsibility – Shared Security Model

The post Cloud Security a Shared Responsibility – Shared Security Model appeared first on CCSI.
The post Cloud Security a Shared Responsibility – Shared Security Model appeared first on Security Boulevard.
Continue reading Cloud Security a Shared Responsibility – Shared Security Model

Letting Go While Holding On: Managing Cyber Risk in Cloud Environments

As recently as 2017, security and compliance professionals at many of Tripwire’s large enterprise and government customers were talking about migration to the cloud as a possibility to be considered and cautiously explored in the coming years. Wi… Continue reading Letting Go While Holding On: Managing Cyber Risk in Cloud Environments

Achieve Security Through Compliance in the Cloud

Digging through my cupboards recently, I came across my old collection of 3½ floppy disks. It’s been quite some time since I’ve had a need to plug in my trusty USB floppy drive, so upon making this great archaeology discovery, I was le… Continue reading Achieve Security Through Compliance in the Cloud

Achieve CIS Compliance in Cloud, Container and DevOps Environments

If you are embracing DevOps, cloud and containers, you may be at risk if you’re not keeping your security methodologies up to date with these new technologies. New security techniques are required in order to keep up with current technology trend… Continue reading Achieve CIS Compliance in Cloud, Container and DevOps Environments