Cloud security, hampered by proliferation of tools, has a “forest for trees” problem

Image: Ar_TH/Adobe Stock A new study Networks found that, on average, organizations rely on over 30 tools for overall security, and that degree of complexity is making for less security, not more.... Read more »

CrowdStrike: Attackers focusing on cloud exploits, data theft

Image: Ar_TH/Adobe Stock CrowdStrike, a cybersecurity firm that tracks the activities of global threat actors, reported the largest increase in adversaries it has ever observed in one year —  identifying 33 new... Read more »

LastPass releases new security incident disclosure and recommendations

Image: Tada Images/Adobe Stock LastPass was hacked twice last year by the same actor; one incident was reported in late August 2022 and the other on November 30, 2022. The global password... Read more »

OneNote documents spread malware in several countries

A new phishing campaign abuses OneNote documents to infect computers with the infamous AsyncRAT malware, targeting users in the U.K., Canada and the U.S. Image: Sashkin/Adobe Stock As Microsoft decided to change... Read more »

Rise of cloud-delivered malware poses key security challenges

The volume of cloud-based malware tripled in 2022 over the prior year, says Netskope, with 30% of the malicious downloads coming from Microsoft OneDrive. Image: AndSus/Adobe Stock As more organizations have turned... Read more »

Tips and tricks for securing data when migrating to the cloud

Image: estherpoon/Adobe Stock More and more organizations are moving mission-critical systems and data to the cloud. While migration to and between all types of cloud services poses security challenges, migration to and... Read more »

How to deploy a self-hosted instance of the Passbolt password manager

A password manager can keep your sensitive information in-house. Here’s how to deploy Passbolt to your data center or cloud-hosted service. Image: Song_about_summer/Adobe Stock Passbolt is a password manager you can use... Read more »

On-premises vs cloud security: What are the pros and cons?

Image: denisismagilov/Adobe Stock As a system administrator, I’ve worked with both on-premises and cloud-based systems in order to support business operations, and I can definitely say I have some preferences and observations... Read more »

Top 5 confidential computing uses in healthcare

Big data meets private data in a perfect storm for healthcare. Confidential computing providers say they’ll make the cloud safer for medical data. Image: National Cancer Institute/Unsplash Healthcare information is personal and... Read more »

Top 6 Multi-Cloud Security Solution Providers

If you’re in the process of constructing a multi-cloud security plan, these providers can help you avoid the most common pitfalls of multi-cloud security. Image: alice_photo/Adobe Stock The rise of multi-cloud in... Read more »