Why Identity and Access Management is the New Public Cloud Perimeter

Identity and Access Management (IAM) has become a key security battleground for attackers and defenders. Unfortunately, many defenders not only lack the expertise to fight this battle, but they are also unaware of its importance. Here's the reality: IAM is the new perimeter in the public cloud. By accessing identity, someone outside an organization (or… Read More »

How Advanced Persistent Threats Work

The term Advanced Persistent Threat, or APT, was apparently first coined at the United States Air Force in 2006 but joined the common vocabulary of the global cyber community in 2010, when Google announced its intellectual property had been the victim of a targeted attack originating from China, reported SearchSecurity. “Advanced persistent threat is probably one of… Read More »