Cloud Security
Discover expert analysis on cloud security with news, features and insights from the team at IT Pro.
-
What is security service edge (SSE)?A brief guide to SSE, the security-focused framework at the heart of every SASE deployment
By John Loeppky Published
-
What is secure access service edge (SASE)?A guide to SASE, a cloud technology approach that combines aspects of networking and cyber security into one platform
By John Loeppky Published
-
CISA issues new directive to bolster cloud security – and Microsoft was singled outNews The directive is a strong push towards bolstering cloud and SaaS security practices
By George Fitzmaurice Published
News -
Machine identity attacks will be top of mind for security leaders in 2025News Security leaders say access tokens and service accounts represent an increasing risk
By Emma Woollacott Published
News -
Understanding NIS2 directives: The role of SASE and Zero TrustWebinar Enhance cybersecurity measures to comply with new regulations
By ITPro Published
Webinar -
Navigating evolving regional data compliance and localization regulations with Porsche InformatikWebinar A data localization guide for enterprises
By ITPro Published
Webinar -
WatchGuard EPDR reviewReviews Smart cloud-hosted endpoint protection that combines great platform and mobile support with a wealth of security features
By Dave Mitchell Last updated
Reviews -
Overcoming shadow IT: Why it happens and how to prevent itWhitepaper Shed light on what’s happening across your environment
By ITPro Published
Whitepaper -
Casting IT into the ShadowsWhitepaper Don’t let Shadow IT jump out and scare you
By ITPro Published
Whitepaper -
Strategies for improving security team efficiencyWebinar Improved security efficiency and from a Cloudflare investment
By ITPro Published
Webinar -
WithSecure Elements Cloud Platform reviewReviews Tough endpoint protection and a wealth of cloud security options priced right for mid-sized businesses
By Dave Mitchell Published
Reviews -
Organizations warned of the dangers of ‘long-lived’ cloud credentialsNews With compromised credentials behind the majority of cloud security incidents, companies need to secure identities
By Emma Woollacott Published
News