Are Long-Lived Credentials the New Achilles' Heel for Cloud Security?

Are Long-Lived Credentials the New Achilles' Heel for Cloud Security?

The head of security advocacy at Datadog, a cloud-based monitoring and analytics platform, has urged enterprises in Australia and the APAC region to accelerate phasing out long-lived credentials for popular hyperscale cloud services, warning that they remain a serious data breach risk. Speaking with TechRepublic, Andrew Krug highlighted findings from Datadog’s State of Cloud Security 2024 report, which identified long-lived credentials as a persistent security risk factor. While credential management practices are improving, Krug noted…

Read More

How Cisco Uses the Isovalent Platform to Secure Cloud Workloads

How Cisco Uses the Isovalent Platform to Secure Cloud Workloads

As cloud environment evolve, efficient and effective workload security has been at the top of the list. At Cisco, we have integrated the Isovalent platform into our infrastructure to ensure our cloud workloads are protected without compromising on performance. Why Isovalent? The Isovalent platform is based on the eBPF (extended Berkeley Packet Filter) technology that offers a very modern approach to securing cloud-native environments. Where traditional security solutions usually fail to keep up with the…

Read More

How Cisco Uses the Isovalent Platform to Secure Cloud Workloads

How Cisco Uses the Isovalent Platform to Secure Cloud Workloads

As cloud environment evolve, efficient and effective workload security has been at the top of the list. At Cisco, we have integrated the Isovalent platform into our infrastructure to ensure our cloud workloads are protected without compromising on performance. Why Isovalent? The Isovalent platform is based on the eBPF (extended Berkeley Packet Filter) technology that offers a very modern approach to securing cloud-native environments. Where traditional security solutions usually fail to keep up with the…

Read More

How to Protect Your Social Media Passwords with Multi-factor Verification | McAfee Blog

How to Protect Your Social Media Passwords with Multi-factor Verification | McAfee Blog

Two-step verification, two-factor authentication, multi-factor authentication…whatever your social media platform calls it, it’s an excellent way to protect your accounts. There’s a good chance you’re already using multi-factor verification with your other accounts — for your bank, your finances, your credit card, and any number of things. The way it requires an extra one-time code in addition to your login and password makes life far tougher for hackers. It’s increasingly common to see nowadays, where…

Read More

How AI Is Changing the Cloud Security and Risk Equation

How AI Is Changing the Cloud Security and Risk Equation

The AI boom is amplifying risks across enterprise data estates and cloud environments, according to cybersecurity expert Liat Hayun. In an interview with TechRepublic, Hayun, VP of product management and research of cloud security at Tenable, advised organisations to prioritise understanding their risk exposure and tolerance, while prioritising tackling key problems like cloud misconfigurations and protecting sensitive data. Liat Hayun, VP of product management and research of cloud security at Tenable She noted that while…

Read More

Products Of The Year 2024: The Finalists

Products Of The Year 2024: The Finalists

CRN staff compiled the top partner-friendly products that launched or were significantly updated over the last year. Now it’s up to solution providers to choose the winners. Application Performance and Observability As more applications run in hybrid-cloud and multi-cloud environments, maintaining application performance has becoming a more complex task. Application performance management and observability tools help IT organizations maintain the health, performance and user experience of business applications, according to market researcher Gartner. Such tools…

Read More

DevOps Decoded: Prioritizing Security in a Dynamic World

DevOps Decoded: Prioritizing Security in a Dynamic World

Introduction: The urgency of security DevOps security marries development, operations, and security to remove the barriers between software developers and IT operations. Doing so ensures the code runs scales and operates reliably across the organization. While DevOps supports rapid updates, there might be reliance on vulnerabilities from third-party components. Development and IT can reduce flaws and adapt new features earlier while fostering teamwork, making software integration more secure. Traditional vs. Integrated Approach: The conventional model…

Read More

DevOps Decoded: Prioritizing Security in a Dynamic World

DevOps Decoded: Prioritizing Security in a Dynamic World

Introduction: The Urgency of Security DevOps security marries development, operations, and security to remove the barriers between software developers and IT operations. Doing so ensures the code runs scales and operates reliably across the organization. While DevOps supports rapid updates, there might be reliance on vulnerabilities from third-party components. Development and IT can reduce flaws and adapt new features earlier while fostering teamwork, making software integration more secure. Traditional vs. Integrated Approach: The conventional model…

Read More

Maximizing business benefits with robust hybrid cloud security

Maximizing business benefits with robust hybrid cloud security

Byline: Chris Jenkins, Principal Chief Architect at Red Hat  The evolution of containers and hybrid cloud technologies has brought significant benefits to the enterprise. These platforms democratize access to new applications and technologies, enabling teams to work more seamlessly together and facilitate increased innovation within the organization. Over the last few years, IT leaders have been championing migrations from on-premises based virtual machines to containers and the hybrid cloud accordingly, with almost three quarters (73%)…

Read More

Ensuring security and compliance in evolving cloud environments

Ensuring security and compliance in evolving cloud environments

With the rapid pace of cloud adoption, organizations are quickly revolutionizing business operations but are having a harder time ensuring that systems are built and operated effectively and deployed with the proper cyber hygiene. Business growth experts say to move fast and break things but failing to implement appropriate cybersecurity controls simply doesn’t work because both the regulatory and threat landscape are evolving more rapidly than ever.  Even before organizations embarked on huge digital transformation…

Read More
1 2 3 15