Cloud Security
Discover expert analysis on cloud security with news, features and insights from the team at IT Pro.
- 
 Understanding NIS2 directives: The role of SASE and Zero TrustWebinar Enhance cybersecurity measures to comply with new regulations By ITPro Published Webinar
- 
 Navigating evolving regional data compliance and localization regulations with Porsche InformatikWebinar A data localization guide for enterprises By ITPro Published Webinar
- 
 WatchGuard EPDR reviewReviews Smart cloud-hosted endpoint protection that combines great platform and mobile support with a wealth of security features By Dave Mitchell Last updated Reviews
- 
 Overcoming shadow IT: Why it happens and how to prevent itWhitepaper Shed light on what’s happening across your environment By ITPro Published Whitepaper
- 
 Casting IT into the ShadowsWhitepaper Don’t let Shadow IT jump out and scare you By ITPro Published Whitepaper
- 
 Strategies for improving security team efficiencyWebinar Improved security efficiency and from a Cloudflare investment By ITPro Published Webinar
- 
 WithSecure Elements Cloud Platform reviewReviews Tough endpoint protection and a wealth of cloud security options priced right for mid-sized businesses By Dave Mitchell Published Reviews
- 
 Organizations warned of the dangers of ‘long-lived’ cloud credentialsNews With compromised credentials behind the majority of cloud security incidents, companies need to secure identities By Emma Woollacott Published News
- 
 AWS CISO Chris Betz wants greater industry collaboration for the multi-cloud eraNews Chris Betz spoke to ITPro about the importance of collaboration and the firm’s focus on bringing security data together By George Fitzmaurice Published News
- 
 Are your cloud resources at risk?News Nearly 40% of organizations have high-risk workloads, and Tenable warns that they are prime attack targets for malicious actors By George Fitzmaurice Published News
- 
 Shared fate vs shared responsibility: What’s the difference and how can your business benefit?Explainer Knowing where your obligations end and your cloud provider's begin isn't always straightforward in the cloud – but it is essential for proper security and compliance By Solomon Klappholz Published Explainer
- 
 North, south, east, west--Securing your network with zero trustwhitepaper How to implement network access and workload segmentation By ITPro Published whitepaper