This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Brand impersonation attacks are a real and imminent threat across the cybersecurity landscape. Security sits down with Mimecast's Amber Johanson to discuss this cyber threat.
As cloud adoption expands, so do cloud security challenges, with 81% of organizations suffering a cloud-related security incident according to Venafi research.
A security vulnerability in Oracle Cloud Infrastructure (OCI) could have allowed unauthorized access to cloud storage volumes of all users, according to Wiz cybersecurity researchers.
A move from VPN to the cloud is beneficial not only from an operational, security, and digital experience perspective, but from an environmental impact perspective.
The Ronald McDonald House Charities of Central Texas implemented a cloud video surveillance system from Eagle Eye Networks to improve operational efficiencies. Learn more in this case study.
CISA published the second version of Cloud Security Technical Reference Architecture (TRA), which seeks to guide agencies’ secure migration to the cloud by defining and clarifying considerations for shared services, cloud migration and cloud security posture management.