CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cloud
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cloud

Digital glowing locks and network circuit showing asset management and the cloud
Cyber SecurityInsights

The Importance of Effective Asset Management in Today’s Cloud Environments

July 12, 2023
By prioritizing asset management, organizations can enhance their security posture, optimize existing security investments, and meet compliance requirements, ultimately safeguarding their digital assets and operations in the cloud, on-prem, or hybrid environment.
Read More
Engineer working on protecting networks showing NIST standards and SaaS security
Cyber SecurityInsights

Shining Light on NIST and Its Influence on SaaS Security

July 3, 2023
NIST’s Guide to a Secure Enterprise Network Landscape released in November 2022 examines the shift from on-premise networks to multiple cloud servers. Although the guide doesn’t address SaaS applications directly many of the principles it discusses can be applied to the SaaS ecosystem.
Read More
Binary code and global data flow showing data management and security posture
Cyber SecurityInsights

Four Easy Ways to Protect Cloud Data Using Data Security Posture Management (DSPM)

April 7, 2023
Today’s modern enterprise is struggling with three key data challenges: the immense growth in how much data an organization must manage,, the massive migration of data to the cloud, and that business-critical data worth protecting now takes a myriad of forms.
Read More
Digital closed padlocks on world map showing cloud and data security
Cyber SecurityInsights

The Times Are A-Changin’: Three Predictions for the Next Generation of Data Security

April 4, 2023
As organizations transition their digital infrastructure to cloud environments, new complexities around data security are born. This increasingly diverse data landscape will fundamentally alter cybersecurity in 2023, from the technologies deployed, to the processes followed, to the people leading the charge.
Read More
Code on computer screen showing DevSecOps and cloud threat defense
Cyber SecurityInsights

DevSecOps Is a Myth: Three Steps for Realistic Cloud Threat Defense

July 12, 2022
More than ten years later, DevSecOps is still more of an idea than an effective practice. There is a better way to defend your cloud environment, and you can do it in three steps.
Read More
Glasses focusing on background showing tech predictions
Cyber SecurityInsights

2022 Tech Predictions

February 14, 2022
For organisations to thrive, they need to prioritise outcomes in their IT investments, leverage trusted industry ecosystems and demonstrate an ability to adapt operating models to customer requirements.
Read More
Man touching on virtual screen padlock showing cloud for ransomware protection
Cyber SecurityInsights

How the Cloud Enables Fast, Easy Recovery From Ransomware and Disasters

November 9, 2021
The relentless march to the cloud is good news for CIOs concerned about ransomware. And once most enterprises have most of their infrastructure there, ransomware attacks will become an occasional annoyance, not a catastrophic disaster.
Read More
Computer screen shows details of Microsoft Azure main page showing active directory security
Cyber SecurityNews

Understanding the Three Core Security Configurations in Azure Active Directory

June 9, 2021
In a hybrid identity environment, Active Directory professionals need a good understanding of Azure Active Directory (AAD) roles, applications, and multifactor authentication (MFA) to effectively secure the environment.
Read More
Man holding mobile smartphone showing data transfer to the cloud with encryption
Cyber SecurityInsights

Both Sides Now – An Insider’s View of Privacy Protection in the Cloud

May 27, 2021
They key to having a safe working environment is maintaining control over the data. Hardware based secure enclaves, including those inside CPUs, have become a rising trend for encryption on the cloud.
Read More
Businessman holding virtual cloud show how to secure unstructured data in the cloud
Cyber SecurityInsights

Room to Grow: Four Areas to Consider for Securely Handling Unstructured Data in the Cloud

October 15, 2020
The cloud can provide better data security than traditional storage … when done correctly. How do you ensure your unstructured data remains secure and highly available?
Read More
Load More
- Advertisement -
- Advertisement -

Latest

Hacker hands using laptop showing car sharing platform data breach

Car Sharing Platform Zoomcar Hit by a Massive Data Breach, Impacting Approximately 8.4 Million People

Meta logo on device screen showing Meta AI

Meta AI Adds Warning That All Prompts, Including Those With Personal Information, Could be Made Public

Hacker working on keyboard showing cyber attack on whole foods distributor

Amazon’s Whole Foods Distributor United Natural Foods Hit by a Cyber Attack that Disrupted Operations

The White House in Washington DC showing cybersecurity executive order

New Cybersecurity Executive Order Takes on Election Interference Sanctions, Encryption Standards and Disinformation Programs

- Advertisement -
- Advertisement -
- Advertisement -
- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

© 2024 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    Data Breach U.S. Regulations Cyber Attack EU GDPR
    See all results