All resources sponsored by:

Horangi

11 Matches
Taking It In Stride: The Role of Cloud Compliance in Digital Transformation
sponsored by Horangi
WEBCAST:As organizations embrace cloud-native technologies such as Secure Access Secure Edge (SASE), they risk their infrastructure growing unnecessarily complex and non-compliant. Compliance in the cloud shouldn’t halt your digital transformation – view this webinar to learn how automation can help you achieve and maintain cloud compliance.
Posted: 30 Mar 2021 | Premiered: Mar 25, 2021
Get This Now


Can You Build Securely In The Cloud?
sponsored by Horangi
RESOURCE:Most engineering teams are no strangers to building in the cloud. However, these cloud environments are huge targets for hackers, and user errors/misconfigurations are making this critical data a low hanging fruit. Read this article to discover how remote engineering teams can address these concerns and build more securely in the cloud.
Posted: 04 Feb 2021 | Published: 04 Feb 2021
Get This Now


Ask A CISO Ep. 04: Hard Truths In Cloud Security
sponsored by Horangi
PODCAST:In this episode of the Ask a CISO podcast, Horangi Director of Cloud Security Engineering Steve Teo joins Horangi Deputy Director of Cyber Operations Mark Fuentes to delve into the nature of cloud data breaches today and how organizations in the cloud can adapt to this growing risk – listen in to unlock their expert insight.
Posted: 04 Feb 2021 | Premiered: Feb 4, 2021
Get This Now


On-Demand Webinar: Cloud Security Blindspots
sponsored by Horangi
RESOURCE:Cloud breaches can have long-lasting impacts that are potentially irreparable, and in most cases the genesis of the threat can be traced back to a misconfiguration issue. This web page offers key insight into common cloud security vulnerabilities, including a webinar which addresses common concerns and questions – continue to get started.
Posted: 04 Feb 2021 | Published: 04 Feb 2021
Get This Now


Unboxing CSPM As The Answer To IaaS Security Risks
sponsored by Horangi
RESOURCE:From lack of controls and misconfiguration to cloud sprawl, there are several cybersecurity risks facing organizations migrating to the cloud. Cloud Security Posture Management (CSPM) tools can help, but it may not be ideal for your organization. Read this article to learn about cloud risks, the benefits of CSPMs and who should use them.
Posted: 03 Feb 2021 | Published: 03 Feb 2021
Get This Now


The Ultimate Guide: What Is CSPM? And How To Select One
sponsored by Horangi
EGUIDE:Gartner predicts that through 2024, organizations implementing a Cloud Security Posture Management (CSPM) could reduce cloud-related incidents due to misconfiguration by upwards of 80%. But what exactly is CSPM, and how should you approach CSPM adoption? Read this e-guide to find out.
Posted: 28 Jan 2021 | Published: 28 Jan 2021
Get This Now


IaaS vs PaaS vs SaaS: Know Your aaS-es
sponsored by Horangi
WHITE PAPER:Whether you’re starting a cloud-native solution from the ground-up or migrating existing on-premise workloads to the public cloud, you’ll need to decide which of the 3 available cloud delivery models (IaaS, PaaS, & SaaS) to use. Leverage this article to educate yourself on all 3 and uncover key considerations to help keep your cloud usage secure.
Posted: 28 Jan 2021 | Published: 28 Jan 2021
Get This Now


What Is The Shared Responsibility Model?
sponsored by Horangi
WHITE PAPER:Cloud service providers often talk about cloud security as being the responsibility of both the customer and the vendor. This is known as the ‘Shared Responsibility’ model, and its aim is to reduce risk by dividing labor between the two parties. Read this short article to learn the ‘what’, ‘why’ and ‘how’ of shared responsibility.
Posted: 27 Jan 2021 | Published: 27 Jan 2021
Get This Now


13 Compliance Frameworks For Cloud-Based Organizations
sponsored by Horangi
WHITE PAPER:The need for cloud compliance begins as soon as you build on the cloud. Considering the shared responsibility of cloud security, which are the regulatory frameworks that you need to be aware of? Leverage this article to get an in-depth look at 13 of them, broken down by cloud vendor, security framework, industry and location.
Posted: 27 Jan 2021 | Published: 27 Jan 2021
Get This Now


Top 3 Security Configurations To Set Up In Your AWS Today
sponsored by Horangi
RESOURCE:With the right preparation and proper configurations, your organization can implement several security practices to reduce the attack surface area and the risk of a breach. In this article, learn how you can get started with Cloud Security Posture Management.
Posted: 26 Jan 2021 | Published: 26 Jan 2021
Get This Now


Top 3 GCP Configurations To Watch For
sponsored by Horangi
RESOURCE:The cost of a security breach can have severe financial and reputation impact on your organization. But you can avoid mistakes like these by configuring your Google Cloud Platform (GCP) resources in a way that minimizes your security risks. Tap into this blog, Top 3 GCP Configurations to Watch For, to learn from major cloud breaches.
Posted: 26 Jan 2021 | Published: 26 Jan 2021
Get This Now


11 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences