There is a way to protect users from deceptive OAuth apps, misconfigurations and misappropriated user permissions. SaaS Security Posture Management (SSPM) takes an automated approach to tracking, and ...
This is the third and final article of a three-part series which investigates the top five human threats to the data held by banks and financial institutions, and offers a fresh perspective on how the ...
I’m seeing a lot of cloud configuration errors in the real world—and it’s scaring the hell out of me A survey of 300 IT professionals by Fugue, a cloud infrastructure security provider, reveals that ...
It's easy for admins to misunderstand what GKE considers authenticated users and set permissions that could allow anyone with a Google account to access their systems. Researchers warn that many ...
Microsoft on Wednesday disclosed that some of its customer support case information was exposed last month due to misconfigured security settings in an Azure-hosted database. The exposure took place ...