Is Confidential Computing the New Gold Standard for Cloud Security?
Confidential Computing is pegged as the next frontier in cybersecurity. Rohit Badlaney, Vice President – IBM Z Hybrid Cloud at IBM explains how this new tre…
Confidential Computing is pegged as the next frontier in cybersecurity. Rohit Badlaney, Vice President – IBM Z Hybrid Cloud at IBM explains how this new tre…
Are vulnerabilities eating into your users and user experience? Clint Cameron of SonarSource shares how clean code approaches can improve production software security.
Digital transformation is driving the use of cloud services, but are organizations using cloud securely. Learn how cloud security tools like CASB and CSPM can deliver greater data security, governance, compliance and help manage cloud security risks.
Amy Ariel, CMO, Ermetic shares how upskilling women could help drive diversity and reduce the skills shortage in cloud security.
Sundaram Lakshmanan, CTO of SASE products at Lookout, sheds light on the most common cloud-security risks and how to tackle them.
The nuisance caused by cloud misconfigurations may have far-reaching consequences. Here’s what was exposed on a poorly configured, unsecure Azure storage blob.
Abnormal Security has teamed up with Microsoft to deliver its cloud-native email security solutions directly from Azure Marketplace.
The Denonia malware is “fairly innocuous†but is loaded with crypto-mining capabilities using XMRig, a popular cryptojacking software.
Cloud security refers to a set of protection procedures, technologies and compliance regulations followed to secure data and applications hosted in the cloud…