Australia’s recent run of serious data breaches has left many commentators asking some very pressing questions. It seems as though there’s perhaps a lot more to it than meets the eye. Yes, one could describe […]
Category: Cloud Security
A guide to CIS Benchmarks
CIS benchmarks are specifically followed to secure applications at the configuration level. These activities include server hardening, cloud configuration reviews, browser or database hardening, etc. While OWASP provides insight on application security and common vulnerabilities […]
Does your organization really need a CASB? Here’s a quick guide
Most organizations have CASB, as a consequence of Covid, migrated their entire application base from on-prem to cloud. They are also simultaneously migrating critical internal applications such as their CRM-based or HR modules to the […]
Do you have the right IAM policies to secure your public cloud?
In a cloud security breach, the problem is misconfigurations in identity and access management (IAM policy). In a tight regulatory environment, a robust IAM policy can secure your cloud environment from inadvertent data leaks. A […]
An SME guidebook to security with Kubernetes
If you are considering a microservices-based architecture to scale up your application or website to the next level, Kubernetes can be a great option to manage it. However, this makes layer-wise security even more important. […]
The Impact of Artificial Intelligence on Organization’s Security
The new-age technologies such as Artificial Intelligence (AI), Machine Learning (ML), and Robotics are driving the biggest technological and organizational changes since the 4th Industrial Revolution. However, these are associated with potential opportunities as well […]
Automation to manage end-to-end data security
Employing automation solutions to implement data security depends on the particular business context. If your enterprise functions in a highly sensitive or regulated industry, then automation solutions can be a great way to minimize downtime […]
The definitive cyber security checklist for enterprises in 2022
An iron-clad cybersecurity program will leave bad actors floundering in 2022. Entersoft shares a definitive cyber security checklist for you to bear in mind while designing your strategy for the coming year What could be […]
Data classification – the first step towards automating data protection
Digitalization is an irreversible trend shaping the future, with countless benefits for people and industries. However, with almost all aspects of life, work and commerce now online, data protection and data security is a critical […]
Microservices architecture, Kubernetes and application security
Since Kubernetes is a container management tool, it is important for teams to secure their application at the start and end of every activity – in the pre-production and deployment stages. DevOps and automation are […]