Cloud Security

Cloud Security

Director of the Cybersecurity and Infrastructure Security Agency, Jen Easterly

CISA Director Easterly to Leave When Trump Assumes Presidency

Jen Easterly, who took over as CISA director in 2021, will step down in January when Donald Trump takes over as president, creating an uncertain future for the critical cybersecurity agency and ...
Security Boulevard
What is Cloud-Native Security?

Missing Out on Cloud-Native Security Innovations?

Are You Really Capitalizing on Cloud-Native Security? Cloud-based platforms, teeming with modern security solutions, are changing the cybersecurity game. But are organizations fully leveraging their capabilities, specifically in managing Non-Human Identities (NHI) ...
Cloud Pentesting 101: What to Expect from a Cloud Penetration Test

Cloud Pentesting 101: What to Expect from a Cloud Penetration Test

Hold on, let’s guess.  You’ve moved a ton of your business to the cloud – storage, applications, the whole nine yards. Cloud computing offers flexibility, scalability, and a bunch of... The post ...
AWS re:Inforce 2023 - Centralize and manage secrets with HashiCorp Cloud (PRT206-S)

Decoding the Secret Lifecycle in the Cloud

The Convergence of Security and R&D Has your organization ever experienced a security breach due to a miscommunication between security and R&D teams? That’s a problem many businesses face today, and one ...
How to View Passwords in Credential Manager on Windows

How Secure Are Your Machine Credentials?

Are Your Machine Credentials Secure Enough? Securing machine credentials has become more than just a good practice – it’s now an absolute necessity. The Gap in Traditional Security Measures For many organizations, ...
Palo Alto Networks SSH Management for Stronger Security

Palo Alto Networks Issues AI Red Alert

SANTA CLARA, Calif. — With great promise comes potential peril. And while artificial intelligence (AI) is looked upon as a panacea for enterprises, it also poses an existential security threat. “We stand ...
Security Boulevard
Discover Aembit banner

How to Defend Non-Human Identities from Infostealers

4 min read The identity layer’s most insidious threat is now setting its sights on a different group of targets. Here's how to be ready. The post How to Defend Non-Human Identities ...
Get Ready for 90-day TLS Certificates with AppViewX

PKI and CLM Insights from 2024: Preparing for a Cyber Resilient 2025

As the year winds down, it’s the perfect time to pause for retrospection. 2024 has been both exciting and challenging for the PKI and CLM space, pushing the industry to rethink strategies ...
SolarWinds Uber CISO liability protection

Insurance Firm Introduces Liability Coverage for CISOs

National insurance firm Crum and Forster is offering a professional liability program for CISOs who are facing growing regulatory pressures and sophisticate cyberattacks but often are not covered by their organizations' D&O ...
Security Boulevard
Permiso, cloud computing, Microsoft security report

Permiso Adds Three More Open Source Cybersecurity Tools

Permiso today made available three additional tools under an open-source license that make it simpler to secure cloud computing environments ...
Security Boulevard