Protecting Applications Across Multiple Clouds

With cloud-based applications come new security risks that require expertise that can delay application deployment & maintenance.
The post Protecting Applications Across Multiple Clouds appeared first on Radware Blog.
The post Protecting Applicat… Continue reading Protecting Applications Across Multiple Clouds

Digital Transformation: Breaking Down Silos for Better Data Security

Today, enterprises are under pressure to improve the power and reduce the cost of running mission-critical business applications by migrating to modern software architectures. By breaking down the silos between adjacent teams and the tools they use, security teams can do this at the same time as they take steps toward zero trust and true […]

The post Digital Transformation: Breaking Down Silos for Better Data Security appeared first on Security Intelligence.

Continue reading Digital Transformation: Breaking Down Silos for Better Data Security

New Ponemon Report: A Programmatic Approach to Vulnerability Management for Hybrid Multicloud

X-Force Red is unveiling a new research study, conducted by the Ponemon Institute, that highlights vulnerability management challenges for on-premises and cloud environments: in other words, hybrid multicloud. The report, “The State of Vulnerability Management in the Cloud and On-Premises,” is based on a global survey of 1,848 IT and IT security professionals in North […]

The post New Ponemon Report: A Programmatic Approach to Vulnerability Management for Hybrid Multicloud appeared first on Security Intelligence.

Continue reading New Ponemon Report: A Programmatic Approach to Vulnerability Management for Hybrid Multicloud

5 Core Tenets for Effective Multicloud Security

For a growing number of organizations adopting cloud-based deployment models, the cloud security challenge is clear. For example, how do I rapidly transform my business in a way that is also secure and compliant? Business leaders have an opportunity to rethink securing their enterprise during the sea-change shift toward cloud models. For instance, leaders should not […]

The post 5 Core Tenets for Effective Multicloud Security appeared first on Security Intelligence.

Continue reading 5 Core Tenets for Effective Multicloud Security

6 takeaways from the Capital One data breach

“WHAT’S IN YOUR WALLET?” is the theme question asked by spokes-celebrity Jennifer Garner in commercials for Capital One. A data breach wasn’t supposed to be one of the things in your wallet but since it was, the company’s brand is taking a huge hi… Continue reading 6 takeaways from the Capital One data breach

Security Considerations for Cloud Hosted Services

A multi-cloud approach enables organizations to move application services to various public cloud providers depending on the desired service level and price points. Most organizations will use multiple cloud providers; some in addition to their privat… Continue reading Security Considerations for Cloud Hosted Services

No Cloud, One Cloud, Multicloud – How do you Secure Big Data Analytics?

The term “Big data” has been around for a while already (almost 15 years now) and the hype is almost over. So is it not relevant anymore?
The post No Cloud, One Cloud, Multicloud – How do you Secure Big Data Analytics? appeared f… Continue reading No Cloud, One Cloud, Multicloud – How do you Secure Big Data Analytics?

Qualys, Lacework, & Multicloud – Enterprise Security Weekly #126

    Cisco unlocks IoT potential with Intent-Based Networking, Qualys extends cloud platform with patch management, Tenable announces general availability of Predictive Prioritization, and Lacework announces security support for Azure and Multicloud env… Continue reading Qualys, Lacework, & Multicloud – Enterprise Security Weekly #126

Ensuring Data Privacy in Public Clouds

Most enterprises spread data and applications across multiple cloud providers, typically referred to as a multicloud approach. While it is in the best interest of public cloud providers to offer network security as part of their service… Continue reading Ensuring Data Privacy in Public Clouds