Remove category public-cloud
article thumbnail

How to Think about Threat Detection in the Cloud

Anton on Security

In this post, we will share our views on a foundational framework for thinking about threat detection in public cloud computing. you, the esteemed reader of this blog , do not need this explanation, perhaps, but a typical cloud user might] How is the cloud different compared to the traditional environment?

article thumbnail

Does the World Need Cloud Detection and Response (CDR)?

Anton on Security

Let’s play a game and define a hypothetical market called Cloud Detection and Response (CDR). But, no, the cloud is not just somebody else’s computer :-) Now, the questions: Does it exist? First, I bet nobody would contest that we need to detect threats in public cloud environments and we need to investigate incidents there.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSAC Fireside Chat: Keeping persistent email threats at bay requires deeper, cloud-layer vigilance

The Last Watchdog

Related: The need for timely training At RSA Conference 2023 , I learned all about a new category of email security — referred to as integrated cloud email security ( ICES ) – that is helping companies more effectively keep email threats in check. These filters look for known bad attachments and links.

article thumbnail

Thales Wins Big in 2023

Thales Cloud Protection & Licensing

Google Cloud Technology Partner of the Year Award Thales was selected as the Google Cloud Technology Partner of the Year in the Security – Data Protection category. With over 20 categories recognizing MSP and vendor achievements, the awards are among the most prestigious in the industry.

Marketing 143
article thumbnail

FIRESIDE CHAT: ‘Attack surface management’ has become the centerpiece of cybersecurity

The Last Watchdog

Related: The importance of ‘SaaS posture management’ As digital transformation continues to intensify, organizations are relying more and more on hosted cloud processing power and data storage, i.e. Platform as a Service ( PaaS ,) as well as business tools of every stripe, i.e. Software as a Service ( SaaS. ).

article thumbnail

BrandPost: The evolution of security service edge (SSE) and zero trust

CSO Magazine

With the recent publication of Gartner’s updated Magic Quadrant for Security Service Edge , we have been asked by several CXOs about this fast-growing solution category and how it relates to zero trust. Once deployed, zero trust technology provides secure access to public or private destinations for users, things, and workloads.

article thumbnail

BrandPost: The Top 4 Threats to a Secure Cloud Infrastructure

CSO Magazine

Cloud adoption has brought a wave of change to today's businesses, from enhanced internal collaboration and consumer engagement to improved agility and cost savings. To safely embrace the cloud and reap its benefits, organizations need visibility into a larger and more complex landscape than ever before.