Tag

cybersecurity

Well-Known Hacking Group Exploits Third-Party Apps and OAuth

Well-Known Hacking Group Exploits Third-Party Apps and OAuth
What do the DNC hacks and the current attempts by hackers to interfere with the French election have in common? Give up?…

Cloud Security News: Week in Review February 24th, 2017 Edition

Cloud Security News: Week in Review February 24th, 2017 Edition
Cloud Security News: Week in Review is our blog series, grabbing the more interesting cloud security scoops from the web. Sit back,…

Your Foolproof Guide to Surviving – Even Thriving – In the SaaS Tsunami

Your Foolproof Guide to Surviving – Even Thriving – In the SaaS Tsunami
Pop quiz. How many SaaS applications are in use at the average organization today? Five? Ten? Twenty? The answer may surprise you.…

20 Questions to Ask Cloud Vendors in Preparation For EU GDPR

20 Questions to Ask Cloud Vendors in Preparation For EU GDPR
In order to fully prepare for the EU GDPR, existing internal processes need to be evaluated, and new ones introduced. But, because…

Configuration Security for Your AWS Console

Configuration Security for Your AWS Console
Your AWS admins sit in front of their consoles, staring at what may as well be a 787 Dreamliner cockpit. With just…
Browser Not Supported

Your browser version is outdated.

We would recommend you upgrade to a recent version to ensure that you have a good experience on the CloudLock site. Outdated browsers also increase your security risk. So please update your browser and come back later!

Click on the icon below to download the latest version of your browser

Close