Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus
New & Notable
Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus News
-
November 14, 2019
14
Nov'19
Google to unveil post-Chronicle cloud cybersecurity plans
Google plans to discuss its cloud cybersecurity portfolio at a conference next week, with the capabilities developed by Chronicle figuring heavily into the mix.
-
August 16, 2019
16
Aug'19
Bibb County School District cybersecurity efforts use AI
Using AI-driven cybersecurity from ManagedMethods, a Georgia school district blocks external threats and identifies potentially harmful language in student documents.
-
June 28, 2019
28
Jun'19
Cybersecurity pros at AWS re:Inforce urged to embrace data storytelling
Robust data coupled with the power of metaphors can help cybersecurity teams tell stories that get the rest of the business on board with new security initiatives and prepare for security crises.
-
April 11, 2017
11
Apr'17
CIA Vault 7 tools attributed to hacking group for years
Security researchers said the CIA Vault 7 tools and techniques are linked to cyberattacks over the past six years targeting various foreign entities.
Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus Get Started
Bring yourself up to speed with our introductory content
-
How to limit the cloud security blast radius of credential attacks
Explore how the security blast radius concept, which has admins evaluating how to assess and limit the damage of a threat, can be applied to cloud identity and access management. Continue Reading
-
Top 4 strategies for cloud security automation
Automating security in the cloud can be invaluable for threat detection and mitigation. These are the key focal areas where security professionals should implement automation. Continue Reading
-
How to collect open source threat intelligence in the cloud
Threat intelligence analysis can be challenging and expensive for enterprises. Expert Frank Siemons explains how open source threat intelligence can simplify the process. Continue Reading
Evaluate Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Benefits of using Azure Security Center for security assessments
Author Yuri Diogenes discusses how Azure Security Center helps admins achieve full cloud visibility, conduct security assessments and prevent potential breaches. Continue Reading
-
Understand CASB technology before you buy
CASB technology offers threat protection, increased visibility and policy enforcement. Explore how these tools protect access to cloud applications, and then compare some of the top products. Continue Reading
-
Defining and evaluating SOC as a service
As cloud use increases, many enterprises outsource some security operations center functions. Evaluate if SOCaaS is the best model for your enterprise. Continue Reading
Manage Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus
Learn to apply best practices and optimize your operations.
-
Use Azure Security Center to conduct a security posture assessment
In this excerpt from Chapter 4 of Microsoft Azure Security Center, the authors outline how to use the software to determine and improve your enterprise's cloud security posture. Continue Reading
-
How to conduct proper AWS vulnerability scanning in 3 steps
Cloud vulnerability management can be complicated. Learn how to perform AWS vulnerability scans under the shared responsibility model. Continue Reading
-
3 best practices for cloud security monitoring
Cloud security monitoring can be laborious to set up, but organizations can make it easier. Learn about three best practices for cloud security monitoring and the available tools. Continue Reading
Problem Solve Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
Addressing vulnerable web systems that are often overlooked
Web security vulnerability scanners often focus on large applications within the enterprise. However, there are plenty of overlooked web systems that contain hidden flaws. Continue Reading
-
Antivirus tools: Are two programs better than one?
Antivirus software is crucial to your device's security. However, less is often more, especially when considering a secondary free antivirus program. Nick Lewis explains why. Continue Reading
-
Katyusha Scanner: How does it work via a Telegram account?
The Katyusha Scanner is based on the open source penetration test scanner Arachni. However, it has been modified to work through Telegram accounts. Nick Lewis explains how it works. Continue Reading