cloud security
-
Breaches
Gainsight Expands Impacted Customer List Following Salesforce Security Alert
Nov 27, 2025Ravie LakshmananRansomware / Cloud Security Gainsight has disclosed that the recent suspicious activity targeting its applications has affected…
-
Cloud Security
Crawl, Walk, Run: Operationalizing Your IaC Security Program
You’ve decided to shift your cloud security left. You researched vendors, evaluated solutions, did a proof of concept and now…
-
Cloud Security
How To Prevent the IaC Misconfiguration Snowball Effect
The goal with infrastructure as code (IaC) frameworks such as Terraform and CloudFormation is to make infrastructure provisioning more efficient.…
-
Breaches
Enterprise Credentials at Risk – Same Old, Same Old?
Nov 07, 2025The Hacker NewsData Protection / Cloud Security Imagine this: Sarah from accounting gets what looks like a routine…
-
Breaches
SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach
Nov 06, 2025Ravie LakshmananIncident Response / Cloud Security SonicWall has formally implicated state-sponsored threat actors as behind the September security…
-
Cloud Security
Prevent Secret Leaks: Find and Secure Secrets Across Your Repositories and Pipelines
Developers use secrets to enable their applications to securely communicate with other services. Hardcoding credentials (like usernames and passwords) simplifies…
-
Cloud Security
You Must Comply! Why You Need Proactive Open-Source License Compliance
As vulnerabilities in open-source code continue to play a prominent role in headline-grabbing exploits, such as Heartbleed and Log4Shell, a…
-
Cloud Security
Infrastructure as Code Security and AppSec: Streamlined DevSecOps From App to Infra
Infrastructure as code (IaC) has fundamentally changed the way we build and manage infrastructure. By transforming cloud resources and their…
-
Cloud Security
Prisma Cloud Provides New Extensive Use Cases for Azure Customers
Microsoft Azure customers can now secure their data and networks and gain broader governance across their cloud assets. Prisma Cloud,…
-
Cloud Security
6 Key Kubernetes DevSecOps Principles: People, Processes, Technology
Container-based application deployment is at its peak, as is the popularity of orchestration platforms like Kubernetes that form the underlying…
- 1
- 2