HackDig : Dig high-quality web security articles for hacker

Do You Know Your Responsibilities When It Comes to Container Security?

As you migrate your enterprise to the public cloud or multicloud, you want to realize some of its inherent benefits regardless of what service model you utilize. Whether your goal is cost optimization, scalability or elasticity, the cloud can allow your enterprise to adopt newer, cutting-edge technologies to innovate your business without the burden of havin
Publish At:2020-03-24 07:55 | Read:148 | Comments:0 | Tags:Cloud Security Application Development Application Security

Grow Your Business With an Evolving Cloud Security Strategy

We have all heard the castle-and-moat analogy to describe traditional centralized approaches to cybersecurity. As cloud security becomes increasingly important in the modern landscape, I think we should add one more component to the analogies we use to think about security: fog. Sometimes the fog is so thick that you can barely see what is in front of you or
Publish At:2020-03-17 10:37 | Read:86 | Comments:0 | Tags:Cloud Security Security Intelligence & Analytics Business Co

RemoteSec: achieving on-prem security levels with cloud-based remote teams

The world of work is changing—by the minute, it feels these days. With the onset of the global coronavirus pandemic, organizations around the world are scrambling to prepare their workforce, and their infrastructure, for a landslide of remote connections. This means that the security perimeter of businesses small and large has transformed practically overnig
Publish At:2020-03-12 15:31 | Read:346 | Comments:0 | Tags:Business cloud infrastructure cloud security cloud services

Making Cloud Security a Team Sport

While most large enterprises are moving to the cloud in some form, the path is never as direct as chief information officers (CIOs) and chief information security officers (CISOs) might like it to be. Most come to terms with the fact that the cloud won’t be a single offering, but rather a hybrid multicloud that aligns critical applications with cloud s
Publish At:2020-02-21 09:34 | Read:299 | Comments:0 | Tags:Cloud Security Cloud Cloud Adoption Cloud Infrastructure Clo

To Rank or Not to Rank Should Never Be a Question

Let’s face it: Vulnerability management is not what it used to be a decade ago. Actually, it is not what it used to be a couple of years ago. Vulnerability management is one of those ever-evolving processes. Whether it is because of compliance mandates, board demands, an overall desire to reduce risk, all of these objectives or none, almost every organ
Publish At:2020-02-20 10:49 | Read:389 | Comments:0 | Tags:Endpoint Risk Management Software & App Vulnerabilities Clou

Business in the front, party in the back: backdoors in elastic servers expose private data

It seems like every day we read another article about a data breach or leak of cloud storage exposing millions of users’ data. The unfortunate truth is that the majority of these leaks require no actual “hacking” on the part of the attacker. Most of the time, this highly confidential data is just sitting in open databases, ripe for the
Publish At:2020-01-17 16:50 | Read:462 | Comments:0 | Tags:Threat spotlight aws AWS buckets cloud database cloud databa

Shrink Your Enterprise Cloud Computing Security Concerns With a Cloud Vendor Risk Management Program

According to a recent Forrester report, enterprise cloud computing adoption accelerated in 2016 and will do so again in 2017. Software-as-a-service (SaaS) remains the largest portion of the public cloud market, with global spending expected to reach $105 billion in 2017 and $155 billion by 2020. Infrastructure-as-a-service (IaaS) and platform-as-a-service (
Publish At:2017-08-22 09:30 | Read:4891 | Comments:0 | Tags:Cloud Security Risk Management Cloud Cloud Adoption Cloud Co

Microsoft researchers create a secure haven in the cloud

Microsoft researchers have figured out a new way to keep data and applications secure in the cloud, by cordoning them off in memory from the underlying infrastructure.The approach, which Microsoft calls Haven, could help enterprises feel more comfortable using the cloud for mission-essential data and applications, said the researchers, who are presenting the
Publish At:2014-10-09 22:25 | Read:3422 | Comments:0 | Tags:Security Security Cloud Computing Cloud Infrastructure Cloud

IBM secures SoftLayer with Intel trusted modules

Fortifying its SoftLayer cloud services for enterprise use, IBM has started using Intel’s chip-based Trusted Execution Technology to help organizations in highly regulated industries meet their auditing and security compliance requirements.On Monday, IBM started offering bare-metal cloud servers—servers with no software installed—with Intel’s Trusted Executi
Publish At:2014-09-08 02:30 | Read:3813 | Comments:0 | Tags:Security Security Cloud Infrastructure Cloud computing

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud