Hi, what are you looking for?
Cloud security specialist Qualys has provided its view of the top five cloud security risks, drawing insights and data from its own platform and...
Watch Cloud & Data Security Summit sessions to learn how to utilize tools, controls, and design models needed to properly secure cloud environments.
Microsoft Azure shared key authorization can be exploited to access business data and achieve remote code execution.
Apple has patched 3 zero-day vulnerabilities that have likely been exploited by a spyware vendor to hack iPhones.
Egyptian opposition politician Ahmed Altantawy was targeted with spyware after announcing a presidential bid, security researchers reported