When it comes to protecting businesses from the growing variety of Office 365 security threats, balancing the benefits of multifactor authentication with user demands for convenience is a fine art.
Whether your journey to the cloud is just beginning, in progress or already completed, there are many design and cloud security questions you should address upfront to avoid future pitfalls.
As enterprises race to adopt the hybrid cloud, they should consider cloud computing security first to ensure that advantages don't outweigh risks.
It's time for cloud security teams to turn the tables on malicious actors and use doxing — in the form of attacker reconnaissance — to uncover vulnerabilities before they turn into full-blown threats.
With more devices outside the corporate perimeter and more apps stored in the public cloud, organizations must abandon on-premises security for new conditional access models to achieve zero trust.
Application containers can reduce costs and streamline software development, but they also increase the attack surface, necessitating strict adherence to container security best practices.
With the advent of digital transformation, it becomes even more important — and urgent — that business technology awareness be stressed right along with security awareness training.
When it is implemented correctly, hybrid cloud data protection enables organizations to safeguard critical data across their choice of on-premises, public and/or private cloud services.
Digital fraudsters are sending out emails and SMS messages that link to tech support scams hosted on popular cloud platforms.
Until now, we've looked at the cybersecurity skills gap in a very broad sense, as if all security jobs and needs are equal. Maybe it's time we look at the skills gap problem in different ways.