Cloud Network Security Trends and Tactics
New & Notable
Cloud Network Security Trends and Tactics News
-
March 24, 2020
24
Mar'20
RSA Conference 2020 guide: Highlighting security's human element
What's happening at the 2020 RSA Conference? Our team keeps you up to date with pre-conference coverage and breaking news from the infosec world's biggest event.
-
October 22, 2019
22
Oct'19
Equifax shares 'risk averse' cloud security model post-breach
Equifax explains how it has transformed its data security strategy using multiple clouds and a more focused approach through Google Cloud Platform's hierarchal security.
-
March 07, 2019
07
Mar'19
Microsoft promotes zero-trust security over firewalls
Microsoft told RSA Conference attendees a zero-trust model is better than firewalls for protecting corporate data -- a stance that some said doesn't go far enough.
-
September 27, 2018
27
Sep'18
Network security challenges remain a top concern for IT pros
In networking news, security remains a top concern for IT pros; ExtraHop integrates with Microsoft Azure; and Barefoot Networks unveils developer tools for programmable ASICs.
Cloud Network Security Trends and Tactics Get Started
Bring yourself up to speed with our introductory content
-
SASE vs. SD-WAN comparison: How are they related?
SASE and SD-WAN both connect geographically separate endpoints to each other and an organization's network resources, but the methods in which they do so differ in various ways. Continue Reading
-
4 steps toward cloud security automation
Automating security in the cloud can be invaluable for threat detection and mitigation. Explore the four key areas where security professionals should implement automation. Continue Reading
-
How to calculate SASE return on investment and costs
SASE return on investment will vary for each organization, depending on use cases and architecture requirements. But the metrics used to determine ROI and cost factors are the same. Continue Reading
Evaluate Cloud Network Security Trends and Tactics Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Why it's SASE and zero trust, not SASE vs. zero trust
SASE and zero trust are hot infosec topics. But, when it comes to adoption, it's not a question of either/or, but using SASE to establish and enable zero-trust network access. Continue Reading
-
How SASE convergence affects network and security roles
Most enterprises have siloed departments, but SASE's convergence of network and security functions could disrupt those constructs and drive more communication between teams. Continue Reading
-
How cloud-based SIEM tools benefit SOC teams
It's time for SIEM to enter the cloud age. Learn about the cloud-based SIEM features that can help SOC teams gain a holistic view of their organization's cloud infrastructure. Continue Reading
Manage Cloud Network Security Trends and Tactics
Learn to apply best practices and optimize your operations.
-
Secure multi-cloud with architecture and governance focus
Certified enterprise and security architect Jeroen Mulder explains why multi-cloud security architecture planning should be informed by the business and customer perspectives. Continue Reading
-
Cloud computing forensics techniques for evidence acquisition
With these tools and methodologies, security teams can provide analysts with the critical pieces required to complete a cloud computing forensics investigations puzzle. Continue Reading
-
Considerations for SASE management and troubleshooting
SASE opens new territory for network and security management and troubleshooting. Ultimately, teams should look for system usability and visibility into traffic flows and policies. Continue Reading
Problem Solve Cloud Network Security Trends and Tactics Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
Top 11 cloud security challenges and how to combat them
Before jumping feet-first into the cloud, understand the new and continuing top cloud security challenges your organization is likely to face -- and how to mitigate them. Continue Reading
-
How to address and mitigate serverless security issues
There are two major security implications of serverless cloud infrastructure: secure coding and identity and access management. Uncover best practices to mitigate these risks. Continue Reading
-
Experts say CIA security triad needs a DIE model upgrade
Using a distributed, immutable, ephemeral strategy instead of the traditional CIA triad could enable enterprises to encourage security by design and minimize risk, two experts say. Continue Reading