Click any tag below to further narrow down your results
+ automation
(6)
+ risk-management
(5)
+ monitoring
(4)
+ open-source
(2)
+ vulnerability
(2)
+ infrastructure
(1)
+ developer-enablement
(1)
+ monitoring-tools
(1)
+ security-analytics
(1)
+ data-security
(1)
+ risk-assessment
(1)
+ data-classification
(1)
+ secrets-management
(1)
+ best-practices
(1)
+ threat-detection
(1)
Links
Upwind offers a cloud security platform that enhances visibility and threat detection for cloud deployments and applications. It focuses on real-time monitoring and inside-out security, allowing organizations to prioritize vulnerabilities and streamline compliance efficiently.
This article outlines key trends and insights in cloud security for 2025. It covers various security aspects, including code security, compliance, and monitoring across multiple cloud platforms. The focus is on how organizations can enhance their security posture amid evolving threats.
This article outlines Tenable's cloud security platform, which offers tools for managing risks across multi-cloud and hybrid environments. It covers features like cloud workload protection, identity management, and data security, aimed at helping organizations identify and mitigate vulnerabilities effectively.
This article discusses the importance of preventing misconfigurations in cloud environments through proactive measures. It outlines methods for visualizing current security postures, enforcing organizational policies, and continuously monitoring for misconfigurations to reduce risks and improve compliance.
Figma has achieved C5 accreditation, a standard for cloud security compliance in Germany, Austria, and Switzerland. This recognition confirms Figma's commitment to high security standards, making it easier for organizations in regulated sectors to trust and use its services.
Prowler is an open-source platform for automating security and compliance checks across various cloud environments. It offers a wide range of built-in controls for standards like CIS and PCI-DSS, along with a user-friendly interface for monitoring and managing security assessments. Prowler can be deployed in multiple environments, including workstations and cloud services.
The Apono Privileged Access Platform focuses on eliminating standing permissions to enhance security for users and systems. It uses a Just-in-Time access model to minimize risks like insider threats and data breaches while ensuring compliance with necessary regulations.
Join the quarterly webinar series featuring FortiCNAPP product experts as they unveil the latest innovations in cloud security. Attendees will gain insights into new features, learn practical strategies for enhancing security posture, and have the opportunity to engage in live Q&A sessions to address specific concerns.
Building a cloud security roadmap is essential for organizations to effectively manage and mitigate risks associated with cloud environments. The article outlines key components of such a roadmap, including risk assessment, compliance considerations, and the importance of continuous monitoring and improvement. It emphasizes the need for a strategic approach to ensure robust cloud security practices are in place.
Implementing guardrails in cloud infrastructure is essential to prevent security vulnerabilities, unexpected costs, and compliance issues. The article explains how Open Policy Agent (OPA) can be integrated with Terraform to enforce policies as code, ensuring consistent governance and security for cloud resources. It provides practical policy examples and steps for integrating OPA into Terraform workflows.
FortiCNAPP is a unified platform designed to enhance cloud security by automating risk management, threat detection, and compliance monitoring across multi-cloud environments. It simplifies and strengthens security operations, enabling teams to quickly identify and respond to threats while maximizing productivity with minimal effort. The solution integrates advanced machine learning to continuously monitor for unusual behaviors and vulnerabilities, improving overall security efficacy.
Fortra's Data Security Posture Management (DSPM) solution provides organizations with tools to discover, classify, and protect sensitive data across various environments, including cloud and on-premises. The platform enhances visibility into data ecosystems, prioritizes risks based on data sensitivity, and integrates data loss prevention measures to ensure comprehensive protection.
Effective secrets management is crucial for organizations navigating their cloud journey, helping to mitigate risks associated with account compromise. This article outlines an 18-point checklist tailored to different stages of cloud adoption, focusing on best practices for managing secrets securely as environments grow more complex.
Business and technical leaders must engage their cloud teams with critical questions to enhance cloud security and compliance. By focusing on visibility, policy enforcement, and proactive risk management, organizations can integrate security into their development processes, ensuring safety and innovation in multi-cloud environments.
The article discusses various products and solutions offered by Datadog, focusing on enhancing enterprise developer enablement through comprehensive security measures, monitoring tools, and industry-specific applications. It highlights capabilities in code security, cloud monitoring, and compliance across multiple sectors including finance, healthcare, and technology.
Cloud Snitch is a powerful tool designed to enhance your understanding of AWS account activity, providing an intuitive interface for exploring and documenting AWS principals, IP addresses, and network activity. It helps users quickly identify errors and suspicious behavior, while also allowing for the generation and management of service control policies to enforce security compliance. Open-sourced under the MIT license, it can be deployed easily or used through cloudsnitch.io.