CloudLock Blog

20 Questions to Ask Cloud Vendors in Preparation For EU GDPR

20 Questions to Ask Cloud Vendors in Preparation For EU GDPR
In order to fully prepare for the EU GDPR, existing internal processes need to be evaluated, and new ones introduced. But, because…

CloudLock Report: Despite Warnings, Employees Using Pokémon Go Expose Corporate Networks

CloudLock Report: Despite Warnings, Employees Using Pokémon Go Expose Corporate Networks
In June, we unveiled our Q2 Cloud Cybersecurity Report, “The Explosion of Apps,” which highlighted the exponential growth and security risks of…

Hold On to Your Clouds: Cisco Completes Acquisition of CloudLock

Hold On to Your Clouds: Cisco Completes Acquisition of CloudLock
The current era of Cloud Security is officially over. Today marks the day that Cisco has completed its acquisition of CloudLock. Together,…

Configuration Security for Your AWS Console

Configuration Security for Your AWS Console
Your AWS admins sit in front of their consoles, staring at what may as well be a 787 Dreamliner cockpit. With just…

Five Things You Should Definitely Do At Black Hat 2016

Five Things You Should Definitely Do At Black Hat 2016
Whether this is your first trek to Vegas for Black Hat or your tenth, for those of you that are attending, expect…
Browser Not Supported

Your browser version is outdated.

We would recommend you upgrade to a recent version to ensure that you have a good experience on the CloudLock site. Outdated browsers also increase your security risk. So please update your browser and come back later!

Click on the icon below to download the latest version of your browser

Close