Cloud Security
Discover expert analysis on cloud security with news, features and insights from the team at IT Pro.
-
Understanding NIS2 directives: The role of SASE and Zero Trust
Webinar Enhance cybersecurity measures to comply with new regulations
By ITPro Published
Webinar -
Navigating evolving regional data compliance and localization regulations with Porsche Informatik
Webinar A data localization guide for enterprises
By ITPro Published
Webinar -
WatchGuard EPDR review
Reviews Smart cloud-hosted endpoint protection that combines great platform and mobile support with a wealth of security features
By Dave Mitchell Last updated
Reviews -
Overcoming shadow IT: Why it happens and how to prevent it
Whitepaper Shed light on what’s happening across your environment
By ITPro Published
Whitepaper -
Casting IT into the Shadows
Whitepaper Don’t let Shadow IT jump out and scare you
By ITPro Published
Whitepaper -
Strategies for improving security team efficiency
Webinar Improved security efficiency and from a Cloudflare investment
By ITPro Published
Webinar -
WithSecure Elements Cloud Platform review
Reviews Tough endpoint protection and a wealth of cloud security options priced right for mid-sized businesses
By Dave Mitchell Published
Reviews -
Organizations warned of the dangers of ‘long-lived’ cloud credentials
News With compromised credentials behind the majority of cloud security incidents, companies need to secure identities
By Emma Woollacott Published
News -
AWS CISO Chris Betz wants greater industry collaboration for the multi-cloud era
News Chris Betz spoke to ITPro about the importance of collaboration and the firm’s focus on bringing security data together
By George Fitzmaurice Published
News -
Are your cloud resources at risk?
News Nearly 40% of organizations have high-risk workloads, and Tenable warns that they are prime attack targets for malicious actors
By George Fitzmaurice Published
News -
Shared fate vs shared responsibility: What’s the difference and how can your business benefit?
Explainer Knowing where your obligations end and your cloud provider's begin isn't always straightforward in the cloud – but it is essential for proper security and compliance
By Solomon Klappholz Published
Explainer -
North, south, east, west--Securing your network with zero trust
whitepaper How to implement network access and workload segmentation
By ITPro Published
whitepaper