Category: Cloud

GIAI >> Cloud

The global state of the cyber security industry 2022

Introduction to cyber security in 2022 Cyber security is central to operational success Cyber security…

Impact of cloud configuration security practices

State of cloud configuration security practices The use of the cloud is set to grow…

How does CISO strategy prevent threats?

Executive summary of CISO CISOs are under immense pressure to protect their organization and keep…

The four pillars of cloud security

A brief introduction to cloud migration Cloud migration describes moving some or all of a…

Customer details compromised in LastPass data breaches

The data breaches LastPass suffered in August and November 2022 resulted in confidential customer information…

How carding can affect your business

This article explains what carding is, how hackers can gain access to payment details and…

IOTW: Over 77,000 Uber employee details leaked in data breach

Rideshare company Uber has suffered a data breach after Teqtivity, a software company which provides…

Why Privileged Access Management is a priority task

There is a thought-provoking CIS Controls document that discusses the application of the Pareto principle…

IOTW: Passwords secure in latest LastPass data breach

Password manager LastPass has continued to maintain the security of its customers’ passwords despite suffering…

The state of cloud configuration security practices

To read this report in full in PDF format, click the ‘view report’ button The…