Resources

The world of cloud changes quickly. Stay up-to-date with the latest trends & innovation, all explored in our resource library.

Explore our full library

slider item
Cloud Workload Protection
From our Partners 21.02.21

Bots are frequently used by hackers while they are performing reconnaissance against potential targets.

Read more
3 Reasons Why Excessive Permissions are Your #1 Cloud Threat
Cloud Workload Protection
From our Partners 21.02.21

Protecting against excessive permissions, and quickly responding when those permissions are abused, became the #1 priority for security administrators.

Read more
Most Cyber Attacks Follow These 6 Stages
Cloud Workload Protection
From our Partners

The biggest and most harmful attacks don’t happen in minutes, but rather unfold over months. They aren’t executed in a few clicks, but through a long process of exploration and exploitation. Here’s how to better prepare for them.

Read more
Are Your DevOps Your Biggest Security Risk? How API Access Keys Risk Your Cloud Workloads
Cloud Workload Protection
From our Partners

Can publicly exposed API keys really lead to data breaches? How common are they in reality? And what, if anything, can be done against such exposure?

Read more
Stop Thinking Detection. Think Correlation
Cloud Workload Protection
From our Partners

Why security alerts are useless without proper context, and how to obtain it without sweating it.

Read more
Smart Teaching to Avoid Data Breaching
Cloud Workload Protection
Steven Puddephatt, Senior Cloud Architect @ GlobalDots 05.06.20

It can’t have escaped everyone’s attention, since the move to the cloud the number of data breaches has gone through the roof.

In this article, GlobalDots’ Solutions Architect Steven Puddephatt discusses why this is happening, why workplace policy won’t fix it, and what your organization can do to reduce the risk of being next.

Read more
Cloud Security Posture Management Best Practices
Cloud Workload Protection
Admin Globaldots 25.07.19

Cloud Security Posture Management (CSPM) automatically assess your cloud environment against best practice and security violations to provide the steps required to remediate them – often through autom

Read more
Unlock Your Cloud Potential
Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Contact us