Latest
Veracode Acquires Phylum Assets to Enhance Supply Chain Security
Ver.ID Secures USD 2.05 M to Help Euro Firms Adhere to eIDAS 2.0
Fortinet's FortiGuard Labs Uncovers Two Malicious Python Packages
Keepit Secures USD 50M in its Latest Funding Round
Arctic Wolf Acquires Cylance of BlackBerry for USD 160M
Sublime Security Nabs USD 60 M for its Platform and Community
Ayar Labs Raises $155M to Transform AI Workloads with Light
Citrix Acquires Strong Network and DeviceTRUST for Zero-trust Security
Vaultree Open-sourced its Data Encryption Technology Elements
AWS is Widening its Cybersecurity Portfolio to Combat Breaching
Login
Login
Insights
cloud
solutions
virtualization
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
News
cloud
solutions
virtualization
digital
digital marketing
social media marketing
Finance
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
Whitepapers
All
Security
managed detection and response...
threat hunting – what, why and how...
why are targeted ransomware attacks so successful?...
kaspersky anti targeted attack...
kaspersky next edr optimum...
kaspersky siem - the centerpiece of your security ...
ent - kaspersky industrial cybersecurityit-ot conv...
uncovering cyber threats_ kaspersky incident analy...
proactive threat management_ insights into managed...
threat hunting – what, why and how...
why are targeted ransomware attacks so successful?...
the innovative potential of xdr...
2024 state of application strategy report...
datos – api security solution evaluation guide...
challenges in application security (and why your o...
ai pcs are quickly becoming the key to achieving s...
5 strategies to defend against the growing risk of...
5 strategies to defend against the growing risk of...
5 strategies to defend against the growing risk of...
5 strategies to defend against the growing risk of...
All
Security
mitigating credential harvesting with advanced sec...
purchase cyber insurance: why it’s essential for...
how to reduce the risk of ransomware? a detailed g...
data tokenization transforming protection and comp...
customer identity access management: build trust ...
application protection management in a digital era...
continuous data protection strengthening business ...
cloud encryption fortifies digital frontier for en...
grid computing harness distributed resources for s...
enhancing cyber resilience: a strategic approach t...
advanced encryption standard: pillar for modern da...
secure sensitive data with privileged access manag...
modernizing secops in enterprises: a comprehensive...
explore 5 tactics to enhance innovation at the edg...
advanced api security: why gateways alone aren't e...
intrusion detection system: the cornerstone of net...
single-vendor sase: key use cases to consider befo...
why are targeted ransomware attacks so successful?...
why threat hunting cyber security is today’s nee...
dynamic application security testing for technical...
All
Security
veracode acquires phylum assets to enhance supply ...
ver.id secures usd 2.05 m to help euro firms adher...
fortinet's fortiguard labs uncovers two malicious ...
keepit secures usd 50m in its latest funding round...
arctic wolf acquires cylance of blackberry for usd...
sublime security nabs usd 60 m for its platform an...
ayar labs raises $155m to transform ai workloads w...
citrix acquires strong network and devicetrust for...
vaultree open-sourced its data encryption technolo...
aws is widening its cybersecurity portfolio to com...
n-able acquires adlumin to expand cybersecurity po...
halcyon secures usd 100 m to combat ransomware...
wiz acquires dazz, a cybersecurity startup for a w...
hp launches enterprise security edition to boost b...
bitsight acquires cybersixgill in a usd 115 m deal...
zscaler launches zero trust segmentation to boost ...
fortinet launches fortiai integrations to expand a...
permiso releases a suite of three open-source tool...
fortanix and versasec partner to strengthen crypto...
crowdstrike to acquire adaptive shield, a cloud se...
All
Security
startup zero networks secures usd 20m...
new searchlight security module brings extra intel...
data privacy best practices every business should ...
Home
Whitepapers
Cloud
Cloud Whitepapers
SOC People: Skills Not Tiers
Sponsored by:
Google
Published By:
Research Desk
Released:
May 05, 2021
Google Cloud Deloitte : In this second article of the “Future of the Security Operations Center (SOC)” series, the team discusses what is arguably the most important component of a SOC—its peo...
Read more
Redefining Security Analytics With Chronicle
Sponsored by:
Google
Published By:
Research Desk
Released:
May 05, 2021
The threats and technology environments around us have changed radically. Security professionals lament that they must manage threats that originated in the 1980s, which means that old threats never l...
Read more
Gartner: The Future of Network Security Is in the Cloud
Sponsored by:
Akamai
Published By:
Research Desk
Released:
Mar 29, 2021
Users, devices, applications, and data are now located outside of the enterprise. According to Gartner’s The Future of Network Security Is in the Cloud , “Security and risk management leaders need...
Read more
CLOUD THREAT REPORT 2H 2020
Sponsored by:
Palo Alto
Published By:
Research Desk
Released:
Mar 10, 2021
Historically, defense in depth has mostly been performed through network-layer controls. While network security controls remain an important component of cloud security, an additional layer of identit...
Read more
The Traditional SWG is out —What’s Taking its Place?
Sponsored by:
Cisco
Published By:
Research Desk
Released:
Feb 08, 2021
Explore the ins and outs of today’s evolving security landscape — and how a modern, cloud-delivered secure web gateway can fit into your infrastructure....
Read more
Transitioning Network Security Controls to the Cloud: The Emergence of Elastic Cloud Gatew...
Sponsored by:
Netskope
Published By:
Research Desk
Released:
Jan 04, 2021
Fundamental changes to network architectures, primarily due to the adoption of cloud services and the implementation of mobility, have rendered traditional approaches to defending the perimeter—to t...
Read more
6 IT Security Risks in a Perimeterless World
Sponsored by:
CyberArk
Published By:
Research Desk
Released:
Dec 06, 2020
In today’s mixed on-premises and cloud IT environment, securing one network perimeter is not enough and one must take a Zero Trust security approach. The Zero Trust Security model moves access contr...
Read more
The 2020 State of Identity Security in the Cloud
Sponsored by:
CyberArk
Published By:
Research Desk
Released:
Nov 25, 2020
With the state of the current public health crisis, CyberArk commissioned CSA to develop a survey to better understand the cloud workload security challenges in the next 12 month and how organizations...
Read more
Simplify Cluster Security At Scale: Centralized Secrets Management Across Hybrid, Multiclo...
Sponsored by:
CyberArk
Published By:
Research Desk
Released:
Nov 19, 2020
Managing secrets across Kubernetes clusters in hybrid and/or multicloud environments using traditional approaches can create a multitude of security risks. CyberArk and Red Hat have an approach that c...
Read more
Transforming Data Protection for Microsoft Azure and Office 365
Sponsored by:
Veeam
Published By:
Research Desk
Released:
Nov 12, 2020
As enterprises accelerate the adoption of a multi-cloud strategy, the need to ensure availability for any application and any data, across any cloud infrastructure, is more important than ever. Vee...
Read more
Posts navigation
Prev
1
2
3
4
…
7
Next
Whitepapers
News
Insights
Security
Security
Security
We use cookies to ensure we give you the best experience on our website. We strongly encourage you to read our updated
Privacy Policy
Agree