Cloud

Microsoft 365 Research Highlights Cloud Vulnerabilities

In a sequence that suggests cloud services may be more vulnerable than many think, Proofpoint researchers have demonstrated how hackers could take over Microsoft 365 accounts to ransom files stored o...

Top Secure Access Service Edge (SASE) Providers

Secure access service edge (SASE) is one of the more recent security concepts to gain traction. At its broadest level, it aims to secure everything outside enterprise firewalls, a concept known as t...

How to Improve SD-WAN Security: 3 SD-WAN Best Practices

As the modern workforce becomes increasingly mobile and enterprises branch out and grow, software-defined wide area networks (SD-WAN) have become a popular choice in the evolution of networking. ...

Top SD-WAN Solutions for Enterprise Security

The development of software-defined wide area networking (SD-WAN) has given enterprise administrators flexibility akin to virtualization to manage distributed networks and users globally. Wide...

McAfee Cloud Launches as Skyhigh Security

The final piece of the complicated Mandiant-FireEye split and subsequent FireEye-McAfee merger fell into place today, as McAfee's cloud security business was officially spun off under the new name of ...

Google to Acquire Mandiant; EDR Acquisition Next?

Google today announced that it has agreed to acquire Mandiant for roughly $5.4 billion to bolster its cloud security. Google noted that Google Cloud already offers a number of security services, in...

Russia, China May Be Coordinating Cyber Attacks: SaaS Security Firm

A SaaS security company says a spike in cyber attacks from Russia and China in recent weeks suggests the two countries may be coordinating their cyber efforts. SaaS Alerts, which helps managed serv...

IBM Moves Into EDR Market With ReaQta Acquisition

IBM is moving into the endpoint detection and response (EDR) market with the acquisition of ReaQta. IBM is positioning the announcement as part of its launch of an XDR product. Extended detection a...

Twitch Breach Shows the Difficulty of Cloud Security

Cloud security is a delicate balancing act of keeping the freedoms that make migration worthwhile while also keeping a company’s data secure. A recent breach of Twitch, an Amazon-owned company, showe...

EU to Force IoT, Wireless Device Makers to Improve Security

The European Union is poised to place more demands on manufacturers to design greater security into their wireless and Internet of Things (IoT) devices. In an amendment to the EU’s 2014 Radio Equip...

Latest articles