Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Techniques for Effectively Securing AWS Lake Formation

A couple months ago, we received a request from one of our enterprise financial clients looking to build their internal data lake capabilities. The client wanted to know more about security best practices related to the AWS data lake management tool, AWS Lake Formation, and asked our team for help. One of our principal security consultants specializing in cloud got to work, preparing an overview of critical security considerations when architecting a data lake system.

Financial Firms In The European Union Are Facing Strict Rules Around Cloud Based Services

In today's hyper-connected world, most of us now take care of our daily tasks with the help of digital tools, which includes online banking. Whether we're reviewing our account balances, transferring money, applying for payment cards, or simply paying our bills, banking has become more digital, and requires financial firms to adapt to this new world of transacting business. This adaptation has seen EU-based financial firms adopting and relying more heavily on cloud services.

With Availability on Google Cloud Marketplace, Salt Now Hits the Cloud Trifecta

Today we announced the immediate availability of the Salt Security API Protection Platform on Google Cloud Marketplace and our acceptance to the Google Partner Advantage program! Salt now provides the cloud trifecta, enabling customers to adopt the Salt platform on the AWS Marketplace (followed by the AWS ISV Accelerate Program), on the Microsoft Azure Marketplace, and now on Google Cloud!

How to Prevent a DDoS Attack in the Cloud

If you want to learn how to prevent a DDoS attack in your cloud environment by detecting the early signs of compromise associated with this threat, then this article should explain most of the best practices required to secure your cloud infrastructure. From January through July 2022, Sysdig Threat Research team implemented a global honeynet system that captured numerous breaches through multiple attack vectors.

Privilege Cloud Security | What's New and Best Practices

As part of our effort to improve the onboarding process, CyberArk has enhanced provisioning and management for personal privileged accounts. This leads to saving time and ensuring consistency when creating privileged accounts. Watch this session to learn about CyberArk Privilege Cloud, including the new, simplified personal admin account creation experience for our customers. We’ll also share some best practices for deploying Privilege Cloud, implementing multifactor authentication (MFA), telemetry, and more.

3 Easy Steps for End-to-End XDR with CrowdStrike and Zscaler

Hybrid working models have increasingly become the normal way of doing business. Employees are working from anywhere, users and their devices are moving on and off the office network, and many applications once hosted in data centers are now moving to public clouds or being replaced with software as a service (SaaS).

Accelerated Cloud Adoption, Digital Transformation, and More Cyber Resiliency In 2023

In this episode of 2023 Predictions, Sathya Sankaran, General Manager of CloudCasa by Catalogic, speaks with Swapnil Bhartiya on his insights into where he sees the industry heading in 2023. The pandemic resulted in the acceleration of cloud adoption and digital transformation and Sathya expects this momentum to continue in 2023 as well.