The Cloud Security Alliance (CSA) has released Telehealth Risk Management, new guidance from the CSA Health Information Management Working Group, which focuses on the importance of healthcare delivery organizations (HDO)...
High-performing security organizations driving dramatic and substantive change, and reaping the benefits of going “all in” on cloud Devo Technology announced the results of a report assessing...
Are you ready for hybrid work? Though the hybrid office will create great opportunities for employees and employers alike, it will create some cybersecurity challenges for...
This is the second part of two articles. Please read the first article here. DevOps has made standardized application architectures obsolete. It’s time to rethink security instead....
Proofpoint, Inc. and Ponemon Institute released the results of a new study on “The Cost of Cloud Compromise and Shadow IT.” The average cost of cloud account compromises reached $6.2...
Palo Alto Cortex Xpanse research team spent the first three months of 2021 monitoring the activities of attackers to better understand how much of an edge adversaries...
In DevOps environments, new cloud applications and feature delivery happen in real time. Unfortunately, so do cloud exploits, where threat actors are increasingly exploiting privileged access...
News quickly spread about a vulnerable call recording app for iPhone named “Call Recorder,” or “Acr call recorder,” as its listing in the Apple App Store...
Two vulnerabilities discovered in Microsoft Azure Functions have been disclosed, although severity of one of the flaws was mitigated by a separate implementation bug. Last week,...
Back before enterprises embraced the cloud and its many benefits, software was released every two years through a formal change management process or organizations would introduce...
Recent Comments