IBM Cloud Identity Service was named a Market Leader among CIAM vendors in the most recent IAM Leadership Compass.
A recent survey by cloud security firm RedLock attributed the rise in cloud data leaks to inadequate policies, lack of compliance and other poor practices.
Organizations must pay closer attention to cloud security risks, such as third-party access and human error, that are hiding in plain sight.
According to IBM X-Force, misconfigured cloud databases accounted for more than 71 percent of reported leaked records so far in 2017.
Shrink Your Enterprise Cloud Computing Security Concerns With a Cloud Vendor Risk Management Program
Security professionals need a layered, end-to-end life cycle approach to managing the security risks associated with enterprise cloud computing.
When installing a microservices architecture, SecDevOps teams must understand the threat vectors and how they affect the company's compliance stature.
Given the sensitivity of data and the rising volume of cyberattacks across the globe, government agencies have deep concerns about cloud security.
Cloud security must be a team effort between providers and customers. The distribution of responsibility depends on the cloud model.
Cloud security is neither a magic bullet for analysts, nor a particularly vulnerable target for cybercriminals. It all depends on the effort you put in.
Data loss prevention (DLP) policies aren't doing enough to combat collaboration tool violations. What does this mean for cloud security?