figures-left figure-right-top figure-right-bottom figure-center figure-left-top-mobile figures-left-bottom-mobile figures-right-top-mobile figures-right-bottom-mobile

Resources

The world of cloud changes quickly. Stay up-to-date with the latest trends & innovation, all explored in our resource library.

slider item
Open Source & Code Security
8 best practices to prevent SQL injection attacks
Guest Writer 31.05.21

SQL injection is one of the most dangerous vulnerabilities for online applications. It occurs when a user adds untrusted data to a database query. For instance, when filling in a web form. If SQL injection is possible, smart attackers can create user input to steal valuable data, bypass authentication, or corrupt the records in your […]

Read more
slider item
Zero Trust Access Management
Adapting Security to Work Anywhere
Guest Writer 31.05.21

“Working from home 2021″ marks a massive shift away from common workspaces in response to the global pandemic. There is no more working remotely or working from home, there is just working. The axiom, “work is what you do, not where you go” has never before been so true. The possibility for the workforce to be location independent […]

Read more
slider item
Zero Trust Access Management
Massive Campaign Targeting UK Banks Bypassing 2FA
Guest Writer

On 14 July, 2020, Oliver Hough, a security researcher from Cyjax, published a report centered on a phishing campaign targeting banking customers in the United Kingdom, which evades two-factor authentication (2FA). On 16 December, 2020, researchers from the Global Threat Intelligence Team at WMC disclosed that they were tracking a threat actor who goes by the alias “Kr3pto”. […]

Read more
slider item
Zero Trust Access Management
Why Phishing Attacks Increase on Holiday Seasons
Guest Writer

Overview Phishing continues to be a major attack vector, and it’s surprising just how many security incidents and breaches start with an employee clicking on a link in a carefully crafted phishing email (and sometimes doing the same with a not-so-well crafted phishing email — see this example).  There’s still a general perception that phishing attacks […]

Read more
slider item
Zero Trust Access Management
Remote Access Security: The Dangers of VPN
Guest Writer 30.05.21

Millions of people worldwide are still working remotely to support shelter-in-place requirements brought on by the pandemic. For many workers, a remote workstyle is a preference that will likely become a more permanent arrangement. Enterprises have responded by expanding their use of VPNs to provide remote access to the masses, but is this the right choice for long-term access?  Aside from enabling easy connectivity, […]

Read more
slider item
Zero Trust Access Management
Remote Access: Network Architecture & Security Considerations
Guest Writer

The global pandemic spurred a massive work-from-home (WFH) wave quite literally overnight. Hundreds of millions of people worldwide were told to stay home to stay safe, but they needed to keep working as best as possible. Enterprises responded to this sudden need for extensive remote network access by focusing on getting people connected—but connectivity often […]

Read more
slider item
Zero Trust Access Management
Cloud Security Basics, Best Practices & Implementation
Guest Writer

Cloud security is a set of controls, policies, procedures, and technologies that protect data, infrastructure, and systems that are stored in cloud environments.  Cloud security measures give businesses the processes and tools they need to keep their data safe, meet their regulatory compliance requirements, protect their customers’ privacy, and establish authentication rules around all of […]

Read more
slider item
Zero Trust Access Management
How to Build IAM with Zero Trust
Guest Writer

This year, the business community was forced to adapt to a new era of distributed work—and cyber threats have adapted right along with them. Between unsecured home WiFi networks and the rise in personal devices accessing company resources, the opportunities for data theft have risen as teams have dispersed. Implementing robust identity and access management […]

Read more
slider item
Compliance Automation
Once Upon a Framework – An Introduction to SOC 2
Guest Writer

SOC2 is today the de-facto standard in security compliance frameworks. Complying with it is an important factor in passing your quarterly and annual financial audits. This is because nowadays security determines, to a great extent, whether or not your business will exist and grow. How did it come to be, and why, exactly, should you […]

Read more
slider item
Compliance Automation
This is the Only SOC 2 Checklist You’ll Ever Need
Guest Writer

The Only SOC 2 Compliance Checklist You’ll Ever Need Are you chasing an endless trail of screenshots? Awake at 3am, stressed about bugging your stakeholders for evidence–again? Wondering why you decided that this dang compliance framework was worth it? Congrats! You must be preparing for a SOC 2 audit. Soc 2 Compliance Checklist – How to Prepare […]

Read more
slider item
Compliance Automation
Cloud Compliance 101
Guest Writer

InfoSec Compliance is a big word, involving most systems in your working environment, and multiple deliverables to be produced for the auditing team. Up till today, this project was as complex as can be. Today, with the introduction of Compliance Automation Platforms, things get simpler. Here’s a list of what you need (and don’t need […]

Read more
slider item
Compliance Automation
Life Is A Checklist of Checklists
Guest Writer

Daily Chaos, By Design We all know how security compliance works. It’s one of those processes no one dares to disrupt. As InfoSec leaders, after having our morning coffee, we quickly move to our emails, going through those routinely generated reports, which leads us to believe that the procedures and controls are still in place […]

Read more
slider item
Compliance Automation
Startup-Speed Products with Enterprise Grade Compliance
Eli Arkush 25.05.21

Let’s face it – Security compliance is a hassle. (Almost) nobody likes it, it’s boring and perceived as a tedious checklist that must be completed in order to achieve the prestigious mark of being “XYZ” compliant. Why is that, and how can we better tackle this challenge? The Compliance Challenge Companies need compliance mainly for 2 […]

Read more

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Contact us
figure figure figure figure figure

Don’t Fortify. Amplify | Cloud Security Reimagined