featureSoftware supply chain still dangerous despite a slew of effortsWhile recent efforts promise a more secure future for software, experts say several challenges could still vex organizations as they try to improve software security.By Cynthia BrumfieldJul 10, 202410 minsCloud SecuritySecurity PracticesSupply Chain feature Top 12 cloud security certificationsBy Eric FrankJun 28, 202414 minsCertificationsIT SkillsCloud Securitynews Orca bolsters cloud security offering with source code supportBy Shweta SharmaJun 26, 20243 minsCloud SecuritySecurity Software newsCloud security faces pressure from AI growth, multicloud useBy Maneesha Tiwari Jun 26, 20245 minsCloud Security newsTata Communications partners with Versa Networks on hosted SASEBy Lynn Greiner Jun 21, 20243 minsCloud SecurityNetwork Security how-toDownload our cloud security posture management (CSPM) buyer’s guideBy Linda Rosencrance Jun 20, 20241 minCloud SecurityEnterprise Buyer’s Guides brandpostSponsored by CrowdstrikeHow to achieve multi-cloud security at the speed of DevOps By Paul Desmond Jun 20, 20244 minsCloud Security newsHow AWS secures its infrastructure with SonarisBy Shweta Sharma Jun 20, 20241 minCloud SecurityNetwork Security featureCCSP certification: Exam, cost, requirements, training, salaryBy Josh Fruhlinger Jun 18, 20248 minsCertificationsIT SkillsCloud Security ArticlesnewsMicrosoft president faces tough questions from Congress on China, securityMicrosoft president Brad Smith promised a renewed focus on security, a year after a major attack on the company’s Exchange email service attributed to a Chinese group.By John Leyden Jun 14, 2024 4 minsEmail SecurityCloud SecuritySecurityhow-toDownload our cloud access security broker (CASB) enterprise buyer’s guideEnterprises have untold numbers of endpoints, which can be on-premises or remote. Cloud access security brokers (CASBs) sit between those endpoints and cloud resources, providing essential visibility and management.By Neal Weinberg and David Strom Jun 13, 2024 1 minAccess ControlCloud SecurityEnterprise Buyer’s GuidesopinionA CISO game plan for cloud securityCISOs are still hampered by bad assumptions and outdated approaches. They should be involved in decisions from day 1 to address unique business needs.By David Linthicum Jun 13, 2024 1 minCloud SecuritynewsFortinet grabs cloud security player LaceworkFortinet will integrate Lacework's technology across its secure access service edge (SASE) and Security Fabric packages.By Michael Cooney Jun 11, 2024 1 minCloud SecuritynewsSnowflake: No breach, just compromised credentials, say researchersAfter weeks of speculation that Snowflake’s systems may have been hacked, cybersecurity researchers at Mandiant say it’s all down to compromised customer credentials.Snowflake is now considering making multifactor authentication mandatory to access its systems.By Paul Barker Jun 10, 2024 5 minsData BreachCloud SecuritynewsNew York Times plays down impact of source code leakBut the implications of the data breach go beyond the attackers being able to cheat at Wordle.By John Leyden Jun 10, 2024 4 minsData BreachCloud SecuritybrandpostSponsored by Palo Alto Networks Cloud security challenges are growing. Here’s why traditional SOC tools are failing to address them Charting the course of cloud security: Bridging the divide between legacy tools and evolving modern threats. Gain visibility today. By Gonen Fink, SVP Products, Cortex & Prisma Cloud, Palo Alto Networks Jun 05, 2024 5 minsCloud SecuritynewsMajor service tag security problems reported in Microsoft Azure Microsoft has opted not to fix the issue reported by Tenable Research, but many defend that decision, arguing that this should be decided by CISOs based on their environment.By Evan Schuman Jun 04, 2024 5 minsCloud SecuritySecurity PracticesVulnerabilitieshow-toCASB buyer’s guide: What to know about cloud access security brokers before you buyA cloud access security broker manages access between enterprise endpoints and cloud resources from a security perspective. Here’s what to consider when selecting the right CASB for your enterprise. By Neal Weinberg and David Strom May 30, 2024 18 minsCloud SecurityCloud ComputingSecuritynewsCritical flaw found in Fluent Bit cloud services monitoring componentHyperscalers grapple with Linguistic Lumberjack vulnerability.By John Leyden May 23, 2024 4 minsCloud SecurityVulnerabilitieshow-toDownload the hybrid cloud data protection enterprise buyer’s guideFrom the editors of our sister publication Network World, this enterprise buyer’s guide helps network and security IT staff understand the issues their organizations face around protecting corporate data in a hybrid cloud environment and how to choose the right solution.By Neal Weinberg May 20, 2024 1 minCloud SecurityData and Information SecurityEnterprise Buyer’s GuidesnewsF5 patches BIG-IP Next Central Manager flaws that could lead to device takeoverTwo high-risk vulnerabilities could allow attackers to gain full administrative control on devices via leaked password hashes.By Lucian Constantin May 08, 2024 5 minsThreat and Vulnerability ManagementCloud SecurityVulnerabilities Show more Show less View all Resources whitepaper SANS CISO Primer: 4 Cyber Trends That Will Move the Needle in 2024 This guide highlights four major cybersecurity trends SANS experts believe will move the needle for CISOs in 2024, analyzing their intricacies, impact, and intersection with the need for continuous cyber training and awareness programs. The post SANS CISO Primer: 4 Cyber Trends That Will Move the Needle in 2024 appeared first on Whitepaper Repository –. By SANS Institute 10 Jul 2024Cloud SecuritySecuritySecurity Practices whitepaper Attract, Hire, and Retain Mid-Level Cybersecurity Roles By SANS Institute 10 Jul 2024Cloud SecurityData and Information SecuritySecurity whitepaper 4 steps to a risk-free cloud migration By RingCentral 08 Jul 2024Application Performance ManagementCloud ManagementCloud Security View all Video on demand videoHoneypots and the evolution of botnets | Salted Hash Ep 23Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm’s recent honeypot research, which gathered information showing how the bot landscape is evolving. Apr 20, 2018 12 minsAdvanced Persistent ThreatsFirewallsBackup and Recovery DJI’s bounty problems and video surveillance programs | Salted Hash Ep 13 Jan 08, 2018 21 minsData BreachHackingApplication Security Zero Trust networks and enterprise security strategy | Salted Hash Ep 12 Dec 18, 2017 26 minsCloud SecurityCloud ComputingSecurity The latest on Azure Stack, cyberattacks, the next iPhone and … keyboards Jul 20, 2017 41 minsAppleMicrosoftSmartphones See all videos Explore a topic Application Security Business Continuity Business Operations Careers Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news AT&T confirms arrest in data breach of more than 110 million customers By Evan Schuman Jul 12, 20246 mins Data BreachCyberattacksPrivacy news Mobile surveillance software firm mSpy suffers data breach By John Leyden Jul 12, 20244 mins Data BreachPrivacy news Known SSH-Snake bites more victims with multiple OSS exploitation By Shweta Sharma Jul 12, 20243 mins MalwareOpen Source podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands Jul 08, 202418 mins CSO and CISO podcast CSO Executive Sessions: Data protection in Malaysia Jul 02, 202415 mins CSO and CISO podcast CSO Executive Session India with Mrinal Kanti Roy, CISO, Cairn Oil and Gas Jul 01, 202416 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience Jul 10, 202424 mins CSO and CISO video CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands Jul 08, 202418 mins CSO and CISO video CSO Executive Sessions: Data protection in Malaysia Jul 02, 202415 mins CSO and CISO