ChaptersCircleEventsBlog
Join us for the in-person CCSK Azure course at Black Hat from August 4–5! Register now for a hands-on deep dive and secure your spot now!

Announcements

Announcements
Embracing Zero-Trust: How to Choose Between Software-Defined Perimeters and Virtual Private Networks
Embracing Zero-Trust: How to Choose Between Software-Defined Perimeters and Virtual Private Networks

FedTech Magazine

October 15, 2019

Organizations Fail to Implement Cloud Security Basics – And it Bites Them
Organizations Fail to Implement Cloud Security Basics – And it Bites Them

Security Boulevard

October 12, 2019

How the Software-Defined Perimeter Is Redefining Access Control
How the Software-Defined Perimeter Is Redefining Access Control

Dark Reading

October 9, 2019

How the Software-Defined Perimeter Is Redefining Access Control
How the Software-Defined Perimeter Is Redefining Access Control

SDxCentral

October 8, 2019

IBM, McAfee among founders of open source security alliance
IBM, McAfee among founders of open source security alliance

ComputerWeekly.com

October 8, 2019

Capital One beach: How about a cessation of misconfigurations?
Capital One beach: How about a cessation of misconfigurations?

SC Magazine UK

September 30, 2019

New data shows that DevOps + security = a winning combination
New data shows that DevOps + security = a winning combination

Diginomica

September 25, 2019

How software-defined perimeter authentication ups security
How software-defined perimeter authentication ups security

Tech Republic

September 23, 2019

The top 10 cybersecurity companies to watch in 2019 - and the key trends to explore
The top 10 cybersecurity companies to watch in 2019 - and the key trends to explore

Cloud Computing News

September 21, 2019

Human error is the biggest threat for cloud tech
Human error is the biggest threat for cloud tech

AccountingWEB UK

September 21, 2019

CISO do's and don'ts: Lessons learned
CISO do's and don'ts: Lessons learned

Help Net Security

September 16, 2019

How to vet vendors' cybersecurity tools for MSP practices
How to vet vendors' cybersecurity tools for MSP practices

TechTarget

September 12, 2019

Secret Server product update: Conquer common cloud challenges with the release of Secret Server 10.7
Secret Server product update: Conquer common cloud challenges with the release of Secret Server 10.7

Security Boulevard

September 12, 2019

What are the benefits and challenges of cloud penetration testing?
What are the benefits and challenges of cloud penetration testing?

TechTarget

September 12, 2019

Is Pentagon JEDI Program a $10B Cloud Security Fiasco?
Is Pentagon JEDI Program a $10B Cloud Security Fiasco?

SDxCentral

September 11, 2019

View from India: Cyber security requires resilience
View from India: Cyber security requires resilience

E&T Magazine

September 11, 2019

AWS Offering Highlights Software Defined Perimeter Space
AWS Offering Highlights Software Defined Perimeter Space

Virtualization Review

September 10, 2019

What are the best criteria to use to evaluate cloud service providers?
What are the best criteria to use to evaluate cloud service providers?

TechTarget

September 9, 2019

Ask the experts: What's the top security risk during cloud migration?
Ask the experts: What's the top security risk during cloud migration?

Security Boulevard

September 9, 2019

Top Inherent Risks with Cloud Security
Top Inherent Risks with Cloud Security

Security Boulevard

September 9, 2019