• Congratulations! You are the new CISO.  What do you do first?
    Congratulations! You are the new CISO. What do you do first?

    Recently a friend of mine, Jim (not his real name), took over as the CISO at a new organization. He asked me the question: Sesh what should I pay attention to? I am going to put my thoughts down below but I would like to hear from all of you. I thought about this question,…

    Read more
  • Challenges of Moving to the Cloud
    Challenges of Moving to the Cloud

        Over the last few years it has become amply clear that continuous and comprehensive configuration management is the key challenge in maintaining the security posture of your computing infrastructure and reducing the ever-present cyber risk, particularly as you adopt new technologies. We have seen in high-visibility breaches like Accenture, Dow Jones, CodeSpaces, and…

    Read more
  • Guest Highlight: Compliance, Standards, and Regulations Are Your Security Friends
    Guest Highlight: Compliance, Standards, and Regulations Are Your Security Friends

        Mohan Bethur, Subject-Matter Expert in Security Compliance, on the Importance of Compliance, Standards, and Regulations In the article Compliance, Standards, and Regulations Are Your Security Friends, we talked about how standards give you guidance on what to do in order to proactively secure your cloud environment. We spoke with Mohan Bethurstrong>, one of…

    Read more
  • Compliance, Standards, and Regulations Are Your Security Friends
    Compliance, Standards, and Regulations Are Your Security Friends

        Our last article showed that proactive automated cloud security carries the business value of true business agility and continuity, increased credibility with customers, and more time and money to put towards achieving business goals. That’s all great, but what is the starting point for proactive automated cloud security? Once an organization has decided…

    Read more
  • How Automated Configuration Management Prevents Ransomware Attacks Like WannaCry
    How Automated Configuration Management Prevents Ransomware Attacks Like WannaCry

        Last Friday’s global ransomware attack was a major wake-up call for governments, companies, and consumers alike.  The WannaCry ransomware attack spread to over 150 countries, affecting critical infrastructure in hospitals, banks, transportation, manufacturing, telecommunications, and police departments.  While the damage runs deep, we can take from this equally deep lessons on how to…

    Read more
  • Guest Highlight: Two Essential Elements of Cloud Security
    Guest Highlight: Two Essential Elements of Cloud Security

        Malcolm Harkins, Chief Security and Trust Officer at Cylance, on Proactive and Automated Cloud Security   In the post Two Essential Elements of Cloud Security, we talked about why your cloud security posture must be proactive and automated for you to get the best business value from the cloud, while protecting your business…

    Read more
  • Two Essential Elements of Cloud Security
    Two Essential Elements of Cloud Security

        If you’re using cloud services to do your work, you probably appreciate the convenience, flexibility, and speed of those services. A lot of people, companies, and analysts agree with you! But whether you’re a business leader or an IT security professional, you’re probably aware that improper cloud usage poses serious security issues that…

    Read more
  • Large Indian Health Insurance Firm Takes Cybersecurity Lead Using Cloud Raxak’s Proactive and Automated Security
    Large Indian Health Insurance Firm Takes Cybersecurity Lead Using Cloud Raxak’s Proactive and Automated Security

      Health insurance and financial services firms use the cloud to operate at the speed and scale of digital financial activity and consumer information, but are often hindered by the complexity of managing security and compliance in the cloud. This conflict is especially acute in India, where 2016’s demonetization action resulted in digital financial activity…

    Read more
  • Cloud Raxak Featured on Momentum’s February 2017 CYBERscape
    Cloud Raxak Featured on Momentum’s February 2017 CYBERscape

      Cloud Raxak is pleased to be featured in the Cloud Security category on Momentum Partners’ February 2017 Cybersecurity Landscape! The CYBERscape is part of Momentum’s 1Q17 Cybersecurity Snapshot, which highlights M&A activity, Venture Capital, Initial Public Offerings, public market valuations, and sector trends in the dynamic Cybersecurity industry. We are glad to be recognized…

    Read more
[newsletter_site_listing]

Back to Top