Cloud Security
Latest about Cloud Security

How to identify and mitigate cloud-based cyber attacks
By Bobby Hellard published
Sprawling IT estates with a vast network of endpoints need a strong security strategy, advanced threat detection, and, ultimately, a human touch

How hackers target the cloud
By Rory Bathgate published
With more business assets in the cloud than ever, understanding the risk of cloud misconfiguration, malware, and credential theft to your business is critical

What are the benefits of unified cloud security?
By Rene Millman published
As cloud adoption accelerates, the complexity of managing multi-cloud environments presents significant security challenges.

Enterprises beware, your LLM servers could be exposing sensitive data
By Solomon Klappholz published
News New research lays bare the lack of robust security protections on the servers hosting many businesses’ AI services

Why the Wiz acquisition makes perfect sense for Google
By Ross Kelly published
Analysis Bringing Wiz under the Google umbrella would markedly improve the tech giant’s cybersecurity capabilities

Critical OpenSSH vulnerability leaves over 14 million servers potentially at risk
By Solomon Klappholz last updated
News Researchers have uncovered the first security flaw affecting OpenSSH in almost two decades, and it's a big one – here’s what you need to know

Enterprises need to get a 'firm grasp' on attack surfaces as cloud breaches surge
By Emma Woollacott published
News A surge in cloud breaches means organizations needs to get a tighter grip on attack surfaces, researchers have warned

How the UK’s Ministry of Defence is overhauling its internal cloud with a secure by design approach
By Peter Ray Allison published
Case study With the goal of consolidating its internal network, the MoD has turned to automated threat detection and questioning the effectiveness of practices such as air gapping
Cloud Pro Newsletter
Stay up to date with the latest news and analysis from the world of cloud computing with our twice-weekly newsletter