Direkt zum Inhalt

Blog (DACH)

19.Sep.2019
Sergio Loureiro, Cloud Security Director
Check out our interactive infographic of the top 10 cloud security myths and common misconceptions.

10.Sep.2019
By Sergio Loureiro, Product Manager Outpost24
While the idea of a Shared Responsibility Model is conceptually understood, organizations taking advantage of the transformative power of public cloud platforms continue to come short practically, of the implementation of basic security controls, giving hackers a one-way ticket to their critical assets and data.
13.Mai.2019
Davey Winder, security journalist
There can be no doubting that the cloud is no longer the future but rather the present for an ever-increasing number of organizations. Driven by factors such as digital transformation, operational efficiency, agility and cost savings, the cloud has proved to be something of a business no-brainer.
25.Apr..2019
Sergio Loureiro, Cloud Security Director
For the increasingly complex cloud migration across IaaS, PaaS and SaaS, Gartner came up with 3 different markets for cloud security assessment solutions, which leads to many questions about their differences and use cases to protect public cloud services.
19.Febr..2019
Sergio Loureiro, Cloud Security Director
Enterprises are moving faster to Cloud but legacy infrastructure will not disappear altogether. CISOs are often worried that hybrid infrastructures will double their work through having to support Cloud and legacy at the same time with a different set of skills and tools. However, it doesn’t have to be this way; get our list of 7 things to get right in hybrid Cloud security now!
07.Jan..2019
Davey Winder, security journalist
You don't have to be a rocket scientist to appreciate the disruptive IT benefits that serverless architectures can bring to your business. These cloud-based Function-as-a-Service (FaaS) platforms are truly transforming the way that they allow the development, execution and management of applications without having to worry so much about the usual infrastructure constraints and complexities. Until, that is, someone goes and mentions security.
03.Dez..2018
Outpost24
Looking back over the years and what we see happening now is the same attack vectors being used that have led to breaches. Web applications and the human element of security remain the cornerstones when it comes to protecting your organization against any weak spots. Your organization’s ever-expanding digital footprint and supply chains are also factors adding to this risk, which cyber criminals are aware of and willing to exploit.
19.Nov..2018
Davey Winder, security journalist
The recent Cathay Pacific airline data breach, the biggest to hit the airline industry to date, should come as a wakeup call to businesses of all sizes and across all sectors.
23.Okt..2018
Sergio Loureiro, Director Cloud solutions
Among the many applications of AI ​​in cybersecurity, the arrival of intelligent assistants (Bots) to improve the speed and accuracy of security data analysis is particularly welcomed. As cloud computing, and now serverless architectures, continue to disrupt IT, the availability of powerful algorithms and machine learning capabilities seem to be a silver bullet for the shortage of security expertise. Nevertheless, data and architecture security of such solutions bring unique challenges. In this article, we will review the potentials and challenges to master security with AI tools.
09.Okt..2018
Outpost24
Digital transformation is fueling widespread adoption of cloud computing, allowing organizations to leverage virtualized infrastructure and accelerate innovation. The cost advantages that cloud infrastructures offer is clear, but your approach to security may need to change to fit technology and process differences. As you move workloads to the cloud, how can you assess infrastructure, application, and data security risks that might disrupt your business?

Looking for anything in particular?

Type your search word here