cloud computing

Cybersecurity: CASB vs SASE

Understanding cybersecurity aspects addressed by Cloud Access Security Broker (CASB) and Secure Access Service Edge (SASE) In an increasingly digital…

8 months ago

Experts warn of an emerging Python-based credential harvester named Legion

Legion is an emerging Python-based credential harvester and hacking tool that allows operators to break into various online services. Cado…

1 year ago

IBM buys Red Hat for $34 Billion, it is largest software transaction in history

IBM announced it is going to buy the open source company Red Hat for $34bn with the intent to enhance its…

5 years ago

Tech giant Telstra warns cloud customers they’re at risk of hack due to a SNAFU

On May 4th Tech giant Telstra discovered a vulnerability in its service that could potentially expose customers of its cloud…

6 years ago

Amazon S3 outage. Increased error rates. Amazon AWS is down

An Amazon AWS S3 outage is causing serious problems for a huge number of websites, applications, and Internet of Things…

7 years ago

Critical DOM XSS flaw on Wix.com put million websites at risk

A DOM-based cross-site scripting vulnerability in the cloud-based development platform Wix.com put million websites at risk. The cloud-based development platform…

7 years ago

The US government created new rules for Cloud Providers

A new set of rules was created by the Department of Defense (DoD) for Cloud Providers to report security holes…

9 years ago

European cloud trends: Law reforms on cloud data protection is vital for the European Commission

Law reforms on cloud data protection is vital for the European Commission (EC). The role of EC and EU has…

9 years ago

Shadow Cloud Services a serious risk for Government Networks

Cloud Security Alliance revealed that shadow cloud service used by employees and unmanaged by IT can pose a major security…

9 years ago

Europol issued 2014 iOCTA report on evolution of cybercrime

The Europol issued 2014 Internet Organised Crime Threat Assessment (iOCTA) report to provide details about on-going developments in the cyber…

10 years ago

This website uses cookies.