Insights

Cloud Security

As more and more organizations use cloud services cyber security and compliance has taken center stage. The benefits of using the cloud for business-critical applications can be undermined if this leads to cyber-attacks, data breaches and compliance failure.

Guide
Guide
Stairway to Cloud Security
Read the complete step-by-step guide to help you make the right decisions to minimize risk and achieve high cloud security.
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
AWS – A new Vision for Hybrid IT?
Attending AWS re:Invent is always an exceptional experience and, despite it being virtual, this year was no different. As usual, there were the expected announcements of bigger better and faster...
Learn more
Whitepaper
Whitepaper
Understanding the Value of Upgrading to Cloud-Based Identity Security
Organizations are facing ever increasing challenges maintaining and modernizing legacy identity security solutions. The shift from on-premises legacy solutions to SaaS based identity security...
Learn more
Event Recording
Event Recording
Enterprise Domain Annotation based Segregation of Duties strategies
Learn more
AWS Announces EU Sovereign Cloud
Blog
AWS Announces EU Sovereign Cloud
On October 25th, 2023, AWS announced their intention to launch AWS European Sovereign Cloud. This is an important announcement which reflects the impact of EU GDPR regulation and the EU recent...
Cloud Security Alphabet Soup
Blog
Cloud Security Alphabet Soup
Is securing your cloud security different from securing other forms of IT? You would think so from the alphabet soup of acronyms around the subject.
A New Pamocracy is Growing Inside Your Organization
Blog
A New Pamocracy is Growing Inside Your Organization
OK everybody is doing it right now, so I asked the analyst’s new best friend, Chat GPT, to define Privileged Access Management. Here is what it said: “Privileged Access Management (PAM) is a...
Oracle CloudWorld Impressions
Blog
Oracle CloudWorld Impressions
Last week, I had an opportunity to visit Oracle CloudWorld, the company’s new flagship conference for customers and partners. Here is what has caught my eye among many announcements.
The HeatWave is Spreading
Blog
The HeatWave is Spreading
MySQL HeatWave is a managed database service created by Oracle that extends the standard MySQL engine with support for in-database high-performance transactional workloads, analytics, machine...
How Does Using Cloud Services Alter Risk
Blog
How Does Using Cloud Services Alter Risk
I am often asked “does using a cloud service alter risk?” I always reply to this question with “well it depends”. Every organization has its own set of circumstances, and the answer needs to take...
Finally, the Multi-cloud We’ve Been Waiting For
Blog
Finally, the Multi-cloud We’ve Been Waiting For
“Multi-cloud” is a tricky term. At its face value, it simply means that your organization is using cloud services from more than one provider, right? But if it’s that trivial,...
Getting to Grips with Zero Trust Network Access Solutions
Blog
Getting to Grips with Zero Trust Network Access Solutions
A Zero Trust approach to cyber security is a concept that has been around for decades, but thanks to advances in technology and the need to adapt cyber security capabilities to support secure...
Google is Buying Mandiant to Boost Customer Protection Against Multi-Cloud Threats
Blog
Google is Buying Mandiant to Boost Customer Protection Against Multi-Cloud Threats
Google plans to acquire Mandiant, a leading provider of cybersecurity defense and response services, for $5.4 billion. What are the future benefits of the deal for both companies?
Modernization of IGA
Blog
Modernization of IGA
Implementing Identity Management and Governance is a long and cumbersome journey. Customizing the system to suit your organization is a must. This process takes a lot of time. Arun Binaykia and...
Google Cloud Advances Security Capabilities by Acquiring SOAR Vendor Siemplify
Blog
Google Cloud Advances Security Capabilities by Acquiring SOAR Vendor Siemplify
Yesterday, Google has announced that it has acquired Siemplify , a well-known provider of security orchestration, automation and response (SOAR) solutions, for an undisclosed amount. The stated...
CSLS Speaker Spotlight: Martin Kuppinger on Cloud Security
Blog
CSLS Speaker Spotlight: Martin Kuppinger on Cloud Security
Martin Kuppinger, Principal Analyst at KuppingerCole, will give a presentation entitled Cloud Security 2025 – Perspective & Roadmap on Thursday, November 11 from 11:00 am to 11:20 am...
1 2 3 4 5 6 7 Next