Thom BradleyNov 5, 20205 minWhy missing on Continuous Monitoring leads to Data Breaches - Capital One’s Breach ExampleData breaches and misconfiguration, get the latest report and statistics as well as great insight on how to avoid it
Thom BradleyOct 22, 20205 minCloud Security & Continuous Compliance Challenges - Risk and ComplianceMany digital companies and enterprises are taking a holistic approach when it comes to managing sensitive workloads on public cloud syste...
Thom BradleyOct 15, 20205 minThe role of Identity Access Management (IAM) in raising Issues that lead to BreachesWith more and more businesses hoping onto cloud systems, there is usually no way of preventing important assets and data if both the end-...
Thom BradleyOct 8, 20205 minWhy Misconfiguration Lead to Breaches - Cloud Security - Risk and Compliance When it comes to cloud security, misconfigurations within security compliance are the biggest threat to the notion of safety that users c...
Brandy KoigiSep 4, 20205 minContinuous Monitoring - why is it key to your cloud survival2020 Cloud Security report and statistics on Continuous monitoring why is important
Francesco CipolloneAug 10, 20202 minDIY Cloud SecurityCloud Security is Complex, that's why we created a product that unifies people and tools. But you should try some of those Cloud tools
Francesco CipolloneApr 20, 20208 minCloud Cybersecurity and the modern applications (part 2)Second part of three articles on cloud security this one focus on the blueprint for cloud security and the firewalls
Francesco CipolloneDec 22, 201813 minCloud Cybersecurity and the modern applications (Part 3)Other articles in the series: Part 1, Part 2, Part 3 Introduction: This article is the third in of a series of articles where we have il...
Francesco CipolloneOct 30, 20185 minCloud Cybersecurity and the modern applications (part 1)Other articles in the series: Part 1, Part 2, Part 3 Introduction Now, I’m not a firewall purist, but I and NSC42 have spent a fair amou...
Francesco CipolloneAug 19, 201810 minAuthentication love story - identity and 0365Disclaimer: this article was produced by NSC42 Ltd in association for the Cloud Security Alliance for the benefit of sharing knowledge. ...