New & Notable
Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus News
May 06, 2020
In in effort to curb accidental data exposures in repositories, GitHub unveiled a new 'secret' scanning tool that examines public and private code repositories for sensitive data.
November 14, 2019
Google plans to discuss its cloud cybersecurity portfolio at a conference next week, with the capabilities developed by Chronicle figuring heavily into the mix.
August 16, 2019
Using AI-driven cybersecurity from ManagedMethods, a Georgia school district blocks external threats and identifies potentially harmful language in student documents.
June 28, 2019
Robust data coupled with the power of metaphors can help cybersecurity teams tell stories that get the rest of the business on board with new security initiatives and prepare for security crises.
Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus Get Started
Bring yourself up to speed with our introductory content
Explore how the security blast radius concept, which has admins evaluating how to assess and limit the damage of a threat, can be applied to cloud identity and access management. Continue Reading
Automating security in the cloud can be invaluable for threat detection and mitigation. These are the key focal areas where security professionals should implement automation. Continue Reading
Threat intelligence analysis can be challenging and expensive for enterprises. Expert Frank Siemons explains how open source threat intelligence can simplify the process. Continue Reading
Evaluate Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Containers have revolutionized app development but pose many security challenges. Uncover how container vulnerability scanning can help and why to consider open source tools. Continue Reading
Author Yuri Diogenes discusses how Azure Security Center helps admins achieve full cloud visibility, conduct security assessments and prevent potential breaches. Continue Reading
CASB technology offers threat protection, increased visibility and policy enforcement. Explore how these tools protect access to cloud applications, and then compare some of the top products. Continue Reading
Manage Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus
Learn to apply best practices and optimize your operations.
In this excerpt from Chapter 4 of Microsoft Azure Security Center, the authors outline how to use the software to determine and improve your enterprise's cloud security posture. Continue Reading
Cloud vulnerability management can be complicated. Learn how to perform AWS vulnerability scans under the shared responsibility model. Continue Reading
Cloud security monitoring can be laborious to set up, but organizations can make it easier. Learn about three best practices for cloud security monitoring and the available tools. Continue Reading
Problem Solve Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Web security vulnerability scanners often focus on large applications within the enterprise. However, there are plenty of overlooked web systems that contain hidden flaws. Continue Reading
Antivirus software is crucial to your device's security. However, less is often more, especially when considering a secondary free antivirus program. Nick Lewis explains why. Continue Reading
The Katyusha Scanner is based on the open source penetration test scanner Arachni. However, it has been modified to work through Telegram accounts. Nick Lewis explains how it works. Continue Reading