Blogs

Bracing for the security data explosion

CISOs should internalize this quote from the former Senator from Georgia, extrapolating its focus to
Read More

Homomorphic encryption: Deriving analytics and ins

What do you do when you need to perform computations on large data sets while preserving their confi
Read More

10 common cloud security mistakes that put your da

The news is filled regularly with attacks on misconfigured cloud servers and the leaked data that cr
Read More

How to avoid subdomain takeover in Azure environme

Have you set up a domain and pointed to a cloud resource and then deleted the site? Have you left be
Read More

Top 7 security mistakes when migrating to cloud-ba

There are good and bad ways to make this migration to the cloud. Many of the pitfalls aren’t exactly
Read More

How one multicloud-based business manages security

Among the biggest cybersecurity challenges CISOs are facing is how to maintain data protection and p
Read More

How to defend against OAuth-enabled cloud-based at

Recently Malwarebytes reported that the SolarWinds hackers accessed its internal emails using the sa
Read More


;