Cloud Security

Qualys Multi-Vector EDR endpoint detection response

Qualys Applies the Concept of EDR Across Your Whole Environment

Qualys recently made its Multi-Vector EDR offering generally available. The product takes the idea of endpoint detection and response (EDR) and applies it in a more holistic way that extends beyond the endpoint to provide additional context and insight. When […]

Qualys Applies the Concept of EDR Across Your Whole Environment Read More »

Forcepoint SASE CyberSummit

Forcepoint Makes the Case for the Future of Cloud-Powered Cybersecurity

Forcepoint is hosting the SASE CyberSummit today. SASE is an acronym for Secure Access Service Edge—essentially redefining the “perimeter” from a cybersecurity perspective in a complex, hybrid, cloud-first world. Forcepoint has packed the day with informative keynotes and valuable breakout

Forcepoint Makes the Case for the Future of Cloud-Powered Cybersecurity Read More »

Intel SGX Microsoft Azure DCsv2-Series

Microsoft Leans on Intel to power Azure Confidential Computing

Intel is a sponsor of TechSpective Data is the fuel that drives business, which is why it’s also a primary target. Protecting data has always been a challenge, but cloud computing, containers, SaaS (software-as-a-service) applications, mobile devices, and IoT (internet

Microsoft Leans on Intel to power Azure Confidential Computing Read More »

cloud security multi-cloud hybrid cloud

Head in the Clouds: Managing Security in a Multi-Cloud World

The rise in business processes supported by cloud services has been well evidenced by organizations using cloud services store confidential data in the cloud environment. But when using cloud services, organizations are still unsure whether to entrust cloud service providers

Head in the Clouds: Managing Security in a Multi-Cloud World Read More »

cybersecurity compliance web browser isolation cloud

Coordinating Efforts for More Effective Security and Compliance

A company is a single entity, but it is comprised of various teams and individuals. Everyone in the company is ostensibly working toward common goals and objectives, but the perspectives and priorities can vary—and sometimes overlap or conflict—from one department

Coordinating Efforts for More Effective Security and Compliance Read More »

Scroll to Top