top of page
Blog and News
Latest:
Search
Thom Bradley
Nov 5, 20205 min read
Why missing on Continuous Monitoring leads to Data Breaches - Capital One’s Breach Example
Data breaches and misconfiguration, get the latest report and statistics as well as great insight on how to avoid it
146 views1 comment
Thom Bradley
Oct 22, 20205 min read
Cloud Security & Continuous Compliance Challenges - Risk and Compliance
Many digital companies and enterprises are taking a holistic approach when it comes to managing sensitive workloads on public cloud...
81 views0 comments
Thom Bradley
Oct 15, 20205 min read
The role of Identity Access Management (IAM) in raising Issues that lead to Breaches
With more and more businesses hoping onto cloud systems, there is usually no way of preventing important assets and data if both the...
205 views0 comments
Thom Bradley
Oct 8, 20205 min read
Why Misconfiguration Lead to Breaches - Cloud Security - Risk and Compliance
When it comes to cloud security, misconfigurations within security compliance are the biggest threat to the notion of safety that users...
1,199 views1 comment
Brandy Koigi
Sep 4, 20205 min read
Continuous Monitoring - why is it key to your cloud survival
2020 Cloud Security report and statistics on Continuous monitoring why is important
198 views0 comments
Francesco Cipollone
Aug 10, 20202 min read
DIY Cloud Security
Cloud Security is Complex, that's why we created a product that unifies people and tools. But you should try some of those Cloud tools
575 views0 comments
Francesco Cipollone
Apr 20, 20208 min read
Cloud Cybersecurity and the modern applications (part 2)
Second part of three articles on cloud security
this one focus on the blueprint for cloud security and the firewalls
278 views0 comments
Francesco Cipollone
Dec 22, 201813 min read
Cloud Cybersecurity and the modern applications (Part 3)
Other articles in the series: Part 1, Part 2, Part 3 Introduction: This article is the third in of a series of articles where we have...
45 views0 comments
Francesco Cipollone
Oct 30, 20185 min read
Cloud Cybersecurity and the modern applications (part 1)
Other articles in the series: Part 1, Part 2, Part 3 Introduction Now, I’m not a firewall purist, but I and NSC42 have spent a fair...
64 views0 comments
Francesco Cipollone
Aug 19, 201810 min read
Authentication love story - identity and 0365
Disclaimer: this article was produced by NSC42 Ltd in association for the Cloud Security Alliance for the benefit of sharing knowledge....
15 views0 comments
GET IN TOUCH
We would love to hear from you!
If you would like to get in touch with us, click on the button below!
bottom of page