Why Are Cloud Misconfigurations Still a Major Issue?

Cloud misconfigurations are by far the biggest threat to cloud security, according to the National Security Agency (NSA). The 2022 IBM Security X-Force Cloud Threat Landscape Report found that cloud vulnerabilities have grown a whopping 28% since last year, with a 200% increase in cloud accounts offered on the dark web in the same timeframe.  […]

The post Why Are Cloud Misconfigurations Still a Major Issue? appeared first on Security Intelligence.

Continue reading Why Are Cloud Misconfigurations Still a Major Issue?

Cloud Compliance Best Practices: A Quick Overview

Cloud compliance is more important than ever, especially as businesses and organizations continue to engage in remote and digital work practices due to COVID-19. Even before the pandemic, more and more companies were migrating to the cloud.  But what e… Continue reading Cloud Compliance Best Practices: A Quick Overview

Creating Cloud Security Policies that Work

Now that the ongoing worldwide trend toward “going digital” has been accelerated by COVID-19, taking extra precautions to protect your organization’s data, communications and information assets is more important than ever. Of course, there are many tra… Continue reading Creating Cloud Security Policies that Work

Share the Responsibility to Avoid A Data Breach

Gain a detailed understanding of the shared responsibility model requirements, which differ by CSP.
The post Share the Responsibility to Avoid A Data Breach appeared first on Sonrai Security.
The post Share the Responsibility to Avoid A Data Breach app… Continue reading Share the Responsibility to Avoid A Data Breach

Shared Responsibility in Data Security

We need to reassess how we define data security and where we place responsibility in protecting our data online. Over the past decade, consumers have enjoyed increasingly convenient, often free services in exchange for sharing their personal data. Whi… Continue reading Shared Responsibility in Data Security

Data Security in the Cloud: How to Lock Down the Next-Gen Perimeter

Enjoy the video replay of the recent Threatpost cloud security webinar, featuring a panel of experts offering best practices and ideas for managing data in a cloudified world. Continue reading Data Security in the Cloud: How to Lock Down the Next-Gen Perimeter