by ray | Jan 4, 2023 | Cloud Security, Security
Almost everyone we speak to these days understands and agrees with this fundamental principle of Zero Trust. So what’s stopping folks? The biggest gripe we hear: they simply aren’t sure where to start. Security tools and network infrastructure have often been in...
by ray | Jan 2, 2023 | Cloud Security, Security
With just about everything delivered from the cloud these days, employees can now collaborate and access what they need from anywhere and on any device. While this newfound flexibility has changed the way we think about productivity, it has also created new...
by ray | Dec 30, 2022 | Cloud Security, Security
Zero trust is everywhere, and it will change the way we undertake security. Just as zero trust concepts are shaping the data center and our networks, they will shape cloud environments, as well. Many of the challenges of cloud security arose because we moved workloads...
by ray | Dec 30, 2022 | Cloud Security, Common Vulnerabilities and Exposures (CVE), Security Breach
Cyber attackers are making over a hundred attempts to exploit a critical security vulnerability in Java logging library Apache Log4j every minute, security researchers have warned. The Log4j flaw (also now known as “Log4Shell”) is a zero-day vulnerability...
by ray | May 6, 2020 | Cloud Security
Dropbox privately paid top hackers to find bugs in software by the videoconferencing company Zoom, then pressed it to fix them. From a report: One year ago, two Australian hackers found themselves on an eight-hour flight to Singapore to attend a live hacking...
by ray | Aug 24, 2019 | Cloud Security, Security, Security Breach
Facebook’s Messenger Kids is supposed to provide parents complete control over who their children chat can with on the app. But as The Verge reported on Monday, that key promise appears to have been broken, thanks to a design flaw with the app....