Cryptocurrencies can threaten more than just your wallet...

It seems that wherever you go these days, or whatever news channel you choose to read or listen to, there’s a good chance you’ll hear about crypto-currencies. A few years ago, only techies knew about Bitcoin; today there’s a chance that even grandma is considering a small investment in the lat...

FREE Guide: Making Automatic Assessment an Integral Part of the CI/CD Process

Continuously introducing new features or configurations into production, sometimes multiple times a day, requires lowering human intervention to a minimum.

Knowing is half the battle...

In the first half of this year alone, the worldwide public cloud services market grew 28.6 percent with revenues of $63.2 billion, according to IDC.

Otherwise what's the point?

Dome9 customers now benefit from the validation that the Dome9 Arc platform exceeds security controls necessary for protecting payment card account data.

Growing fast is one thing. Doing it securely is another.

Cadence Design Systems, Inc. was able to transition from their on premises servers to an efficient and secure AWS ecosystem. This is how they did it.

Let's talk about rules and regulations.

On May 25 of this year the General Data Protection Regulation will go into effect for tech companies. It's time to get prepared or face hefty fines.

We need more women in tech. Nights like these are very encouraging!

A few times a year, a group of Israeli cybersecurity professionals meets to discuss tech. This group is called “Cyber Ladies”. Yes, it’s a women-only group.

This combination is insanely powerful.

The Dome9 Compliance Engine make it feasible to manage Inspector deployments and operations at scale across accounts and regions.

A guide to fighting these new vulnerabilities.

Recently a team of Google Project Zero researchers announced two significant security vulnerabilities in Intel processor chips, known as “Meltdown” and “Spectre”. These vulnerabilities allow applications like JavaScript running in web browsers, or other malware, to gain unauthorized access t...

"As more companies migrate to the public cloud, hackers will follow." A useful forecast from our very own Data Initiative Lead, Shira Shamban.

Growth is good, and will bring many changes to the cloud industry. But not all changes will be good, especially when it comes to security.

It's not too late to get ahead of the hackers.

A quick guide to understanding who is affected by these two major security vulnerabilities and what you can do to lock down your system.

DevOps and Security teams don't HAVE to be enemies.

DevOps teams are finally taking on their share of cloud security responsibilities. And, believe it or not, that's a good thing.

"We’re stuck discussing the implications of not changing the default settings on third-party software week after week,” - Zohar Alon

Data on 123M US households exposed in latest misconfigured AWS cloud storage case - SiliconANGLE

The force was with us yesterday at the Star Wars Episode VIII premiere! We had a great time with you crazy rebels. #thelastjedi

Image may contain: 6 people, people smiling

Vote to keep CUPCAKES LEGAL...or to help us win a major industry award. I forget which.

Either way click here:

Image may contain: one or more people and text

Forget the Golden Globes. This is where the real action is.

This year we're very proud to be on the shortlist to receive a Cyber Security Excellence award! And we need your help so cast your votes!

Get caught up on all the bombshells from this year's Amazon super-convention.

The holiday season is just starting to get into full swing, but for those in the cloud computing space, the main event of 2017 came to a close last Friday.