Securing the Cloud June 23, 2023 Think Your Secrets are Safe in their Vault? Think Again “If you want to keep a secret, you must also hide it from yourself.” You ...
Securing the Cloud June 21, 2023 Top Considerations for Securing AWS Lambda, part 3 Serverless computing or function-based computing, is a way by which customers can develop backend systems ...
Securing the Cloud June 16, 2023 PyPI Suspends New Registrations After Malicious Python Script Attack PyPI, the official repository for Python packages, has recently announced that it has suspended new ...
Securing the Cloud June 15, 2023 When “Good Enough” Isn’t Good Enough for Cloud Migration Security What does it take to secure your cloud network during and after your cloud migration? ...
Securing the Cloud June 8, 2023 Getting started: Deploy Azure Virtual WAN security in just a few minutes Introduction Many organizations are transitioning to Azure Virtual WAN as their preferred networking service. Their ...
Securing the Cloud May 25, 2023 Azure Virtual WAN security is enhanced by Check Point CloudGuard, now Generally Available We are very pleased to announce the general availability of CloudGuard Network Security for Azure ...
Securing the Cloud May 23, 2023 Mitigating Risks in Cloud Native Applications As organizations move their operations to the cloud, they face a difficult challenge in ensuring ...
Securing the Cloud May 16, 2023 VSCode Security: Malicious Extensions Detected- More Than 45,000 Downloads- PII Exposed, and Backdoors Enabled Highlights: CloudGuard Spectral detected malicious extensions on the VSCode marketplace Users installing these extensions were ...
Securing the Cloud April 26, 2023 Top Considerations for Securing AWS Lambda, part 2 Serverless computing or function-based computing is a way by which customers can develop backend systems ...
Securing the Cloud April 21, 2023 Top Considerations for Securing AWS Lambda, part 1 Serverless computing or function-based computing is a way by which customers can develop backend systems ...