Cloud database security: Key vendor controls, best practices

More data than ever before is being put into cloud-based storage repositories. Leading cloud providers offer…

Researcher finds 10 vulnerabilities in Cisco firewalls

Threat researchers at Rapid7 have disclosed 10 separate security issues in Cisco firewall products that could…

Black Hat 2022‑ Cyberdefense in a global threats era

Our Security evangelist’s take on this first day of Black Hat 2022, where cyberdefense was on…

Top 10 customer data privacy best practices

To protect customer data, customer service agents should be able to understand and employ several data…

operation (computing)

What is an operation (computing)? An operation, in computing, is an action that is carried out…

Microsoft doles out $13.7m in bug bounties

Microsoft has paid out a total of $13.7m (£11.3m, €13.3m) in bug bounties over the past…

The potential consequences of data breach, and romance scams – Week in security with Tony Anscombe

The NHS was victim of a potential cyberattack, which raises the question of the impact of…

What goes in a metacloud?

I’m often taken aback by the lack of details we get these days around concepts that…

Should you run your database on premises or in the cloud?

Cloud platforms have become a standard IT infrastructure choice for many organizations, and deployments of cloud…

Cyber criminal forum targets only Russia

Researchers at Digital Shadows’ Photon Research Team have this week published information on an underground Russian…

Translate »