Open-source tool Yor automatically tags IaC resources for traceability and auditability
Help Net Security
May 27, 2021
Five Approaches for Securing Identity in Cloud Infrastructure
Security Boulevard
May 26, 2021
“Network Security” the Biggest Concern for Public Cloud Adoption, Reveals Survey
Security Boulevard
May 24, 2021
How to Move Fast in the Cloud Without Breaking Security
Analytics Insight
May 21, 2021
Making sense of standards for IT infrastructure and operations
TechRepublic
May 21, 2021
Top 5 Attacks in Commonly Used SaaS App
Infosecurity Magazine
May 20, 2021
The abstraction maelstrom: inside the vortex of real cloud planning
ComputerWeekly.com
May 20, 2021
Cloud Security Alliance Announces CxO Trust Initiative to Elevate Cloud and Cybersecurity Knowledge Among Executives
AiThority
May 19, 2021
Five considerations for cloud migration, from the House of Representatives CISO
SC Magazine
May 18, 2021
There Is No True Cloud Security Without Comprehensive Command and Control
Cloud Computing Magazine
May 16, 2021
SolarWinds breach exposes hybrid multicloud security weaknesses
VentureBeat
May 16, 2021
CISA to pilot secure cloud instance in response to SolarWinds attack
Federal News Network
May 12, 2021
Microsoft Azure Blob leak a lesson to CISOs about cloud security responsibility
CSO Online
May 10, 2021
Buyers must navigate cybersecurity market confusion
Tech Target
May 6, 2021
Security Questionnaires: Why You Received One and How to Answer It Effectively
Security Boulevard
May 5, 2021
Things to consider for cloud security and privacy
BollyInside
May 4, 2021
Cloud security and privacy: 7 action items you should consider
Tech Beacon
April 28, 2021
Creating Cloud Security Policies that Work
Security Boulevard
April 27, 2021
Cloud Security Alliance Shines Light on Excellence in Cloud
CyberWire
April 23, 2021
New certification program trains cyber pros in cloud, IoT and other emerging tech
SC Magazine
April 21, 2021