Compliance in the Cloud in 2018

With cloud compliance increasingly becoming a top priority for enterprises, we are hosting a webinar that will explore...

The Cheeseburger Principle of Cloud Compliance

Try a steady diet of cheeseburgers. Ignore your cloud security and compliance. Then see the results – they...

If Reindeer Were Hackers

We know that hackers are not only motivated by money. There are a variety of reasons why they exploit vulnerabilities in...

ESP @ Work: Cloud Security enables “Convenience on Demand”

“The breadth and depth of the security controls out of the box was great, but the real advantage for us was the...

Getting Control of Your Cloud: 10 Predictions for 2018

Organizations that use public clouds are adopting an increasingly sophisticated approach to security. While they have...

‘Tis the Season for Security Best Practices for Online Retailers: 4 Tips to Keep Your Cloud Safe

Holiday shopping is in full swing, as evidenced by the two giddy customers sitting next to me at Starbucks the other...

Werner, Evident.io, and You: We’re All Cloud Security Heroes

AWS watchers saw a flurry of announcements last week at re:Invent, but what I found most interesting was Werner...

More Insight, Better Control: Evident.io Announces Support for Amazon GuardDuty

Our goal from the inception of our company has been to provide continuous cloud security to help users be better...

ESP @ Work: Continuous Security for Continuous Development

“ESP makes it possible for me and my team to optimize our continuous development strategy securely. Both DevOps and...

Your AWS re:Invent Cloud Security Survival Guide

AWS re:Invent is going to be a lot of things – informative, noisy, enlightening, sleepless, sure to be a helluva...

The Jedi Incident Response Plan for Cloud Security

Here is a surefire way to annoy your friends: anytime someone says they tried to do something, you do a funny Yoda voice...

ESP @ Work: Holistic Security as part of the Corporate DNA

“We went through several stages, such as development and implementation of a harmonized security strategy across the...