Magazine Button

Cloud

Configuration or customisation? You are not picking ice cream flavours, so choose with care

Morey Haber, Chief Security Officer at BeyondTrust, tells us about the critical choice between customisation and configuration in cloud computing, highlighting its impact on business efficiency and costs. It is a tale as old as IT itself. How do we, the business, procure a solution that does exactly what we need when the likelihood of […]


Editor’s Question: What does 2024 hold for the cloud?

What does 2024 hold for the cloud? A ‘tidal wave’ of gen AI based solutions going into production. The ‘catapulting’ of observability from IT priority to business requirement. Uncertainty around the effective leveraging of gen AI. The first viable quantum solutions to be offered as cloud platforms. A shift in the cybersecurity landscape as attackers […]


BeyondTrust joins AWS ISV Workload Migration Program

BeyondTrust has announced an expansion of its relationship with Amazon Web Services (AWS) by joining the AWS Independent Software Vendor (ISV) Workload Migration Program (WMP). This step reinforces BeyondTrust’s commitment to providing enhanced security solutions for enterprises aiming for a secure and efficient transition to the cloud. The AWS ISV WMP offers advanced tools and […]


Cloud-native applications requires a security-first mindset

Joe Byrne, CTO Advisor, Cisco AppDynamics, discusses the growing cybersecurity challenges in modern application environments, particularly in Kubernetes, due to rapid development prioritising speed over security. It’s no coincidence that as the shift to modern application is increasing, so is the number of security incidents. A study from Red Hat found that the majority (93%) […]


Washington Technology Solutions partners with Cloud Range to strengthen cybersecurity in Washington State

Cloud Range, the industry’s leading cyber range-as-a-service solution to reduce cyber-risk across the organization, has announced a partnership with Washington Technology Solutions (WaTech) to engage in incident response training in a safe, controlled environment. This initiative aims to enhance the state’s cyber readiness and prepare practitioners to detect and remediate threats. WaTech operates the state’s […]


Google Cloud and Haboob partner to strengthen Saudi Arabia’s nationwide cyberdefence

Haboob, a leading cybersecurity service provider owned by the Saudi Federation for Cybersecurity, Programming and Drones (SAFCSP), has announced its partnership with Google Cloud to deliver Chronicle CyberShield to the Kingdom of Saudi Arabia. This marks the first time Chronicle CyberShield will be offered in a managed services model in the Kingdom, aiming to bolster […]


Research shows nearly half of all data breaches originate in the cloud 

Illumio, the Zero Trust Segmentation company, has released the Cloud Security Index: Redefine Cloud Security with Zero Trust Segmentation, that presents the findings of global research into the current state of cloud security, the impact of cloud breaches and why traditional cloud security technologies fail to keep organisations secure in the cloud.    Vanson Bourne, an […]


Delving into the dangers of cloud security denial

Taj El-khayat, Area VP EMEA South, Vectra AI, explains how on-premises security and cloud security are different beasts on require different approaches. ‘What you don’t know can’t hurt you’ is a perplexing adage. Images of wandering barefoot around a dark cellar strewn with mousetraps are enough to discredit it. And yet, even as headlines highlight […]


Qualys announces TruRisk, FixIT and ProtectIT packages in AWS Marketplace

With up to 43% of cyberattacks targeting small businesses, the Qualys solution is a SMB and SME-focused package offering vulnerability, patch and EDR capabilities in AWS Marketplace. Qualys, a pioneer and leading provider of disruptive cloud-based IT, security and compliance solutions, has announced the availability of its award-winning VMDR TruRisk, FixIT and ProtectIT capabilities in […]


LogRhythm partners with D3 Security to automate threat management and incident response capabilities

LogRhythm has announced its partnership with D3 Security, a leader in smart Security Orchestration, Automation and Response (SOAR). This partnership integrates LogRhythm Axon SIEM with D3 Smart SOAR’s capabilities for incident enrichment and response, offering security teams a robust, integrated solution that streamlines their operations. “As cybersecurity threats continue to evolve and multiply, it is […]


Browse our latest issue

Intelligent CISO

View Magazine Archive