CASB
PCI, CASB, CNAPP, and Other Letters
Authors: Carla Brinker and Kyle Koppe Cloud computing is incredibly popular, yet on an organizational level can still be mysterious. […] ...
Enhance Cloud Security With a Cloud Access Security Broker (CASB)
Cloud access security brokers (CASBs) provide a robust framework for improving cloud security ...
Black Hat: Deepen Desai, Zscaler
Speaker 1: This is Techstrong TV. Mitch Ashley: Hey, everybody, Mitch Ashley. I am at the Mandelay Bay Suite, the studio host for Techstrong here at Black Hat in 2023 Las Vegas ...
Make Security Simple: Streamline Policies in Unified SASEBalancing Configuration and Control is critical for reducing security risks and management complexity
Introduction The Secure Access Service Edge (SASE) service, along with its associated architecture, comprises a powerful amalgamation of multiple security components. These include a stateful inspection firewall, Intrusion Detection and Prevention System ...
Today’s ZTNA is not enough for diverse applications
Authentication & Authorization comes in various colors The Zero Trust Network Access (ZTNA) component of SASE is designed to provide secure inbound access to enterprise private applications. In line with the core ...
The CISO Perspective 2023-02-20 09:19:54
At one point, virtual private networks (VPNs) were a valuable tool for remote workers to access private networks and data centers. But with more and… ...
Defense Vs. Control: The Optimal Approach to Cloud Security
A cloud environment is not a replica of an on-premises network or a data center. Unlike traditional data centers which have a rigid IT architecture blueprint, the cloud comes with flexibility that ...
Juniper Networks Extends Cloud Security Services
Juniper Networks this week added cloud access security broker (CASB) and data loss prevention (DLP) capabilities to its secure access service edge (SASE) platform. In addition, Juniper Networks announced it has partnered ...
Sonrai Adds Ability to Determine Vulnerability Blast Radius
Sonrai Security today announced it has expanded its cloud security platform to include the ability to determine the potential blast radius of a vulnerability. The Sonrai Dig platform uses a graph engine ...
Protecting Data in the Cloud: A Work in Progress
Throughout its history, the tech industry has had to deal with constant change, increasingly complex architectures and security challenges. Security is a particularly deep well of concepts to navigate. One offshoot of ...