Minnesota IT Services, the state cybersecurity and information technology agency, added cloud protection from Radware to better serve the Minnesota community. Read more about the solution in this case study.
Organizations are moving to multi-cloud environments in droves, largely because the cloud is fast, agile and powerful. But is it secure? Inherently —
no.
A report from ManagedMethods and administered by the EdWeek Research Center, "What You Don't Know Can Hurt You: New Survey Identifies Gaps in K-12 Cloud Security," details cybersecurity knowledge gaps in the K-12 sector.
The second Voice of SecOps report from Deep Instinct revealed that the average time elapsed before a company responded to a cyberattack was 20.9 hours globally. The report surveyed 1,500 cybersecurity professionals about their top cyber concerns.
When employing a zero trust strategy at an enterprise, cybersecurity teams must consider instituting a least privilege policy — providing only strictly necessary access credentials to employees and revoking them when no longer needed.
The recent pandemic accelerated a trend towards remote work that has been ongoing for years and, as a result, accelerated usage of cloud-based collaboration platforms and their impact on the field of digital forensics. This article will discuss the trends and challenges associated with these platforms as they pertain to cloud-based data collection and its use in forensic investigations.
The open-source and developer community has adopted Open Policy Agent (OPA) as the de facto standard for authorization.
There are three critical ways OPA can help organizations solve for authorization: