Skip to main content

Blog

11.Apr.2019
Davey Winder, security journalist
Cybersecurity is plagued by a surplus of buzzwords, but occasionally there is one which really is worth investigating further; zero-trust definitely falls into this latter category. So, just what is a zero-trust strategy and how do you implement one effectively in your organization?
15.Jan.2019
Outpost24
A Pen Test is an authorized simulated attack on a computer system, performed to evaluate the security of the system with the goal of informing the system owner of both weaknesses and strengths.
18.Sep.2018
Outpost24 France
The PCI Security Standards Council touches the lives of hundreds of millions of people worldwide. A global organization, it maintains, evolves and promotes Payment Card Industry standards for the safety of cardholder data across the globe.
09.Feb.2018
Fernando Gallego, IT Security at Outpost24
In the digital age, web application penetration testing is one of the most critical elements of an organization’s vulnerability management program. In this blog post we will explain the role of penetration testing plays in protecting your organization against web-related exploitations
02.Jan.2018
Simon Roe, Product Manager at Outpost24
The second part of the OWASP Top 10 2013/17 comparison list with tips and advice to remediate vulnerabilities such as sensitive data exposure, broken access controls, security misconfigurations and cross site scripting (XSS).
24.Aug.2017
SecludIT, now part of Outpost24
Learn more about our Top 10 Microsoft Azure security best practices to continuously secure your cloud environment from cyber-attacks.
16.Jun.2017
SecludIT, now part of Outpost24
Build and improve your DevOps Cycle with an innovative cloud security solution: Elastic Workload Protector. Detect all your cloud vulnerability with our all-in-one solution
08.Jun.2017
SecludIT, now part of Outpost24
Find how AWS partner security solution - Amazon Inspector - works with Elastic Workload Protector to improve your cloud security
09.Mar.2017
SecludIT, now part of Outpost24
Enterprises are migrating to IaaS due to flexibility and speed. However, IaaS brings new security challenges
05.Jan.2017
SecludIT, now part of Outpost24
Common beliefs that IaaS providers are responsible for the security of customer workloads, are wrong. The shared responsibility model for Infrastructure as a Service (IaaS) means that enterprises have to adapt traditional security to secure cloud based workloads. A cloud workload is a discrete capability or amount of work you’d like to run on a Cloud instance. It can be a web server, a container or an hadoop node for example.

Looking for anything in particular?

Type your search word here