Cloud Security

Technology, security threats and competition – they all change rapidly and constantly. Your security stack must therefore be ahead of every emerging threat, but just as importantly, enable full-speed business processes by reducing friction in critical workflows.

Explore our full library

slider item
Open Source & Code Security
Admin Globaldots 12.06.20

SMBleed: A New Critical Vulnerability Affects Windows SMB Protocol

Read more
Smart Teaching to Avoid Data Breaching
Cloud Workload Protection
Nesh (Steven Puddephatt), Senior Solutions Engineer @ GlobalDots 05.06.20

It can’t have escaped everyone’s attention, since the move to the cloud the number of data breaches has gone through the roof.

In this article, GlobalDots’ Solutions Architect Steven Puddephatt discusses why this is happening, why workplace policy won’t fix it, and what your organization can do to reduce the risk of being next.

Read more
VMware to Acquire Kubernetes Security Firm Octarine
Kubernetes Security
Admin Globaldots 18.05.20

VMware to Acquire Kubernetes Security Firm Octarine

Read more
What is Identity and Access Management and Why It’s Important for Modern Companies
Identity & Access Management (IAM)
Admin Globaldots 23.04.20

Business expansion usually leads to an increase in users and employees accessing various applications and platforms from many devices. With an IAM framework in place, companies can control user access to critical information within their organizations.

Read more
Neglected Infrastructure, Invasive Tech to Plague Infosec in 2022
Zero Trust Access Management
Admin Globaldots 20.04.20

Neglected Infrastructure, Invasive Tech to Plague Infosec in 2022

Read more
The Future for Network Security: What Does SASE Bring to the Table?
SD-WAN and SASE
Admin Globaldots 20.03.20

In this article, GlobalDots’ CTO Yair Green has provided insights on SASE, the future of network security.

Read more
Securing Kubernetes and the Container Landscape
Kubernetes Security
Nesh (Steven Puddephatt), Senior Solutions Engineer @ GlobalDots 13.03.20

Read our latest article to find out more about securing your Kubernetes deployments and container landscape.

Read more
Passwords Still Dominant Authentication Method, Top Cause of Data Breaches
Identity & Access Management (IAM)
Admin Globaldots 09.03.20

Passwords Still Dominant Authentication Method, Top Cause of Data Breaches

Read more
Zero Trust Explained
Zero Trust Access Management
Admin Globaldots 27.02.20

In this article we explain zero trust framework and what benefits it offers.

Read more
44% of Security Threats Start in the Cloud
Zero Trust Access Management
Admin Globaldots 24.02.20

44% of Security Threats Start in the Cloud

Read more
A New Decade of Challenges and Solutions for IT Professionals
Identity & Access Management (IAM)
Nesh (Steven Puddephatt), Senior Solutions Engineer @ GlobalDots 13.02.20

In this article, GlobalDots’ solutions architect, Steven Puddephatt, offers his insight on future IT security challenges in 2020 and the decade ahead.

Read more
How to Implement Zero Trust Security
Zero Trust Access Management
Admin Globaldots 15.11.19

Enterprises are exposed to a variety of security risks stemming from the fact that access to internal applications opens up the entire network to attack. To counter these challenges, enterprises have started to rely on zero trust security. In this article we’ll discuss zero trust security implementation.

Read more
Cloud Security Posture Management Best Practices
Cloud Workload Protection
Admin Globaldots 25.07.19

Cloud Security Posture Management (CSPM) automatically assess your cloud environment against best practice and security violations to provide the steps required to remediate them – often through autom

Read more
Unlock Your Cloud Potential
Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Book a Demo