Cloud Security: Messy Blobs and Leaky Buckets

Moving to the cloud means a lot more than just moving your servers and applications to the cloud; it’s also about the data – and data always has a target on it. A lot of IT departments are finding that it’s easier to meet the “five nines” (99.999%) of … Continue reading Cloud Security: Messy Blobs and Leaky Buckets

How to Prepare for Misconfigurations Clouding the Corporate Skies

With cloud misconfigurations rampant in cloud storage and IaaS environments, adding security layers to identify them is crucial for securing sensitive data. Continue reading How to Prepare for Misconfigurations Clouding the Corporate Skies

GKE, AWS, & S3 Buckets – Application Security Weekly #67

    GKE improves authentication with Workload Identity, AWS reinforce reveals traffic tools and security solutions that improve support for DevOps, Brief history of Trusted Execution Environments, From the Enterprise’s Project: How to Explain Ser… Continue reading GKE, AWS, & S3 Buckets – Application Security Weekly #67