Amazon is responsible for securing its cloud. Your security inside its cloud is on you.
Cloud functions, or serverless apps, are small, fast and pop in and out of existence. So, how do you secure them?
While big data is a challenge to defend, big data concepts are now applied extensively across the cybersecurity industry.
After 15 years, the OWASP Top 10 list remains largely the same
It’s no longer privacy vs security. Regulations like GDPR and customer data breaches have joined privacy and security efforts at the hip.
Their granularity, deployment speed, and data traffic volume require new approaches to securing container environments.
Today’s cyberattack lifecycle is short, unpredictable, and often with brutal results.
To protect the edge, enterprises should move toward architectures that will protect applications even if the infrastructure is compromised.
Power supplies, cooling systems, even security systems themselves can all be entry points for attackers.
No amount of planning can replace regular drills. Here’s what they should include.
DDoS attacks are also on the rise, but spying reports are down. Fewer people are clicking on phishing links.
Serverless applications increase the attack surface by introducing privilege escalation and application dependencies.
Colo provider first to market among peers with encryption service based on Intel’s cutting-edge SGX tech.
Hackers are placing crypto mining software on devices, networks, and websites at an alarming rate. These tools can help spot it before it does great harm.
Using open source components saves developers time and companies money. In other words, it’s here to stay. Here’s a look at what it will take to improve open source security.