Google Cloud Platform (GCP) Permissions Handling By: Eyal Levy- CloudGuard, Research Team Introduction Managing access authorization for your cloud assets is a challenging task. Certainly, when dealing with multiple public/private resources, environments, services, providers, and…
Read MoreBy, Trisha Paine, Head of Cloud Marketing Program Cloud security raises unique challenges compared to security on premises. Security professionals are now faced with the challenge of securing everything across multiple clouds. On average over…
Read MoreBy: Trisha Paine, Head of Cloud Marketing Programs The healthcare industry has always been more cautious when it comes to new deployment mechanisms, especially when they involve the cloud. While one appreciates all of the…
Read MoreSince this blog past was published, CloudGuard passed official VMware certification for VMware NSX-T 2.5 and 3.0, for Edge Service Insertion and Service Chaining. Published by Jonathan Maresky, Product Marketing Manager, Cloudguard IaaS, May 8th,…
Read MoreHaving already looked at the challenges of moving to the cloud, and how attackers gain control of a victim’s account, in this third and final post in our cloud security series, we will be looking…
Read MoreThe rise of software-defined WAN (SD-WAN) has enabled public cloud adoption by extending connectivity from on-premise to cloud applications. A recent CSO article discusses how security is a key inhibitor towards rapid migration to the…
Read MoreSome big news erupted today in Las Vegas at Check Point CPX 360° with the announcement of the immediate release of CloudGuardtm, Check Point’s new family of cloud security products. With CloudGuard solutions, enterprises are…
Read MoreWhat do high-clearance government employees, telecommunication customers and WWE fans all have in common? While this sounds like the beginning of a joke, in reality what unifies all of them is the fact that their…
Read MoreA recent incident has left the voting records of 198 million Americans exposed. The data included the names, dates of birth, addresses, and phone numbers of voters from both parties. It also included voter’s positions…
Read More2016 proved to be another year of devastating data breaches, spanning across multiple industries, across both large and small companies alike. There have been many sobering moments throughout the year, validating once again, that no…
Read More