#cloudsecurity search results

Microsoft Defender for Cloud enables organizations to improve their security posture at scale. Explore its benefits in the Microsoft-commissioned Forrester Consulting Total Economic Impact™ study: msft.it/6019svLKb #CloudSecurity #MicrosoftDefenderforCloud


Enterprises should immediately audit their disaster recovery. Hyperscalers aren't foolproof, and things *will* go wrong. Build redundancy. Demand stronger SLAs from cloud providers to protect your business. #CloudSecurity #DataRecovery


Ready to level up your #cloudsecurity game? 🔒 Master Azure's robust security features & prep for AZ-500. Become the security champion your IT needs: bit.ly/49v5iOh #azure #microsoft #training #certification #learningpath

SecurityTube's tweet image. Ready to level up your #cloudsecurity game? 🔒 Master Azure's robust security features & prep for AZ-500. Become the security champion your IT needs: bit.ly/49v5iOh

#azure #microsoft #training #certification #learningpath

I’ve officially earned the ISO 27001 Lead Auditor Certification. 🎉 #CyberSecurity #CloudSecurity #GRC


Day 3 of My Cloud Security Journey ☁️ IaaS: secure OS+. PaaS: secure app+. SaaS: secure users & data. Cloud ≠ someone else’s problem. 🔗 [linkedin.com/posts/ifedayo-…] #CloudSecurity #PhantomSec @cybergirl_io @cyber_combat @cyber_razz @chovwenofuru @emperoredetan @Ox_HayWhy

PhantomSecDY's tweet image. Day 3 of My Cloud Security Journey ☁️

IaaS: secure OS+.
PaaS: secure app+.
SaaS: secure users & data.
Cloud ≠ someone else’s problem.
🔗 [linkedin.com/posts/ifedayo-…]
#CloudSecurity #PhantomSec

@cybergirl_io @cyber_combat @cyber_razz @chovwenofuru @emperoredetan @Ox_HayWhy

In today’s digital-first world, businesses rely on SaaS applications and cloud platforms to accelerate growth, collaboration, and innovation. bit.ly/3vgw3Rn #eScan #CloudSecurity #SaaSProtection #Cybersecurity #SecureEveryWorkflow #EmpowerEveryMove

escan_tweet's tweet image. In today’s digital-first world, businesses rely on SaaS applications and cloud platforms to accelerate growth, collaboration, and innovation. 
bit.ly/3vgw3Rn
#eScan #CloudSecurity #SaaSProtection #Cybersecurity #SecureEveryWorkflow #EmpowerEveryMove

SaaS apps provide speed and flexibility, but unmanaged usage causes SaaS sprawl. 📊 Mid-sized firms use 130+ SaaS apps ⚠️ IT only manages half 🚨 Risks: Shadow IT, data leakage, compliance issues, rising costs #CyberSecurity #SaaS #CloudSecurity #RiskManagement #Compliance


Cloud outages can cripple businesses. Even giants like AWS and Microsoft aren't immune. Redundancy should be a priority, not an afterthought. The recent spike in system failures is a wake-up call. #CloudSecurity #TechRisk


Cloud risk isn't just technical—it's ethical. Leaders must prioritize resilience and be transparent about tech limitations. Openness builds trust; silence amplifies risk. #CloudSecurity #TechEthics


AI progress is driven by the people behind it, not just hype. I'm proud to be at @Sysdig, collaborating with brilliant minds like Flavio to redefine #cloudsecurity with agentic #AI. Discover what fuels their dedication to Sysdig Sage™ below! Find out more okt.to/7mwc53


Many businesses don't realize how dependent they are on cloud hyperscalers. Recent outages highlight the risks, impacting even those without direct AWS accounts. Are your vendors transparent about their dependencies? #CloudSecurity #AWS


Truffle Security secures $25M in Series B to advance its secret scanning tech, including TruffleHog Enterprise and GCP Analyze, boosting detection and remediation of leaked credentials. Backed by Intel Capital & a16z. #SecretScanning #CloudSecurity ift.tt/KozLtYV


Day 17 of #LearnAWSInPublic Mastering cloud governance & compliance today: CloudWatch & CloudTrail: For monitoring & auditing. AWS Config & Audit Manager: For continuous compliance checks. Control Tower: For governing a multi-account setup. #AWS #CloudSecurity

JustJoshthenoob's tweet image. Day 17 of #LearnAWSInPublic 

Mastering cloud governance & compliance today:

CloudWatch & CloudTrail: For monitoring & auditing.

AWS Config & Audit Manager: For continuous compliance checks.

Control Tower: For governing a multi-account setup.

#AWS #CloudSecurity

Originally from DataDog: Learnings from recent npm supply chain compromises securitylabs.datadoghq.com/articles/learn… ( :-{ı▓ #cloudsecurity #datadog #cyberresearch

Cyb3rR3s34rch's tweet image. Originally from DataDog: Learnings from recent npm supply chain compromises securitylabs.datadoghq.com/articles/learn… ( :-{ı▓ #cloudsecurity #datadog #cyberresearch

🚀 Your Gateway to Multi-Cloud Compliance & Security is Here! @suronex is LIVE! Achieve seamless, automated cloud security & compliance across multi-cloud & SaaS. Unified visibility. Real-time control. Stay secure, compliant & ahead. ✨ #CloudSecurity #Compliance #SaaS


Your customers trust you to defend their data. Learn 10 reasons why your business wins when you invest in #CloudSecurity. Download the white paper: ow.ly/3H6E50Xbt92

ISC2's tweet image. Your customers trust you to defend their data. Learn 10 reasons why your business wins when you invest in #CloudSecurity. 

Download the white paper: 
ow.ly/3H6E50Xbt92

Day 2 of my @awscloud cloud networking I focused on traffic flow & access control: -Set up route table for public access -Added security group to manage resource-level access -Created Network ACLs to control traffic at the subnet level. @sisinerdtweets @ireteeh #CloudSecurity


Google's $32B acquisition of Wiz just cleared a major antitrust hurdle with the DOJ. Discover what this means for cloud security and enterprise leaders. #GoogleAcquisition #CloudSecurity #TechNews


15% of breaches start with cloud misconfigurations. We audit & automate your cloud security to seal the gaps. Learn more ➤ sniperwatch.com #sniperwatch #cloudsecurity

SniperWatchX's tweet image. 15% of breaches start with cloud misconfigurations. We audit & automate your cloud security to seal the gaps. Learn more ➤ sniperwatch.com #sniperwatch #cloudsecurity

From compliance to containers—secure your AWS stack with: ✅ NIST, PCI DSS, GDPR ✅ Serverless & IoT protection ✅ Multi-cloud & hybrid strategies Built for cloud pros & security enthusiasts. 🛡️ #CloudSecurity #AWS #DevSecOps #CyberResilience 🔗 ow.ly/VQ7H50X6qT6

Apress's tweet image. From compliance to containers—secure your AWS stack with:

✅ NIST, PCI DSS, GDPR
✅ Serverless & IoT protection
✅ Multi-cloud & hybrid strategies

Built for cloud pros & security enthusiasts. 🛡️ #CloudSecurity #AWS #DevSecOps #CyberResilience

🔗 ow.ly/VQ7H50X6qT6

🇨🇦 Public cloud ≠ guaranteed compliance. PIPEDA and PHIPA require Canadian data residency, yet global providers may move data across borders without transparency. Stay compliant and in control. #DataResidency #PHIPA #CloudSecurity [Read article] megawire.com/data-complianc…

MegawireInc's tweet image. 🇨🇦 Public cloud ≠ guaranteed compliance.  
PIPEDA and PHIPA require Canadian data residency, yet global providers may move data across borders without transparency.  
Stay compliant and in control.  
#DataResidency #PHIPA #CloudSecurity  
[Read article] megawire.com/data-complianc…

New findings reveal that most cloud breaches result from identity compromises and process flaws, not zero-day exploits. Alarmingly, 99% of cloud identities remain over-privileged, posing increased security risks. #CyberSecurity #CloudSecurity techday.co.nz/story/cloud-br…


containerd CVE-2024-25621: Local Privilege Escalation A directory permission flaw in containerd lets local attackers gain root access. Patch ASAP if using affected versions. For more details, read ZeroPath's blog on this vuln. #CloudSecurity #DevSecOps #AppSec


📦 Day 22/50: Public S3 buckets = public leaks. Check. Lock. Encrypt. #AWS #CloudSecurity #DataLeak


Your customers trust you to defend their data. Learn 10 reasons why your business wins when you invest in #CloudSecurity. Download the white paper: ow.ly/3H6E50Xbt92

ISC2's tweet image. Your customers trust you to defend their data. Learn 10 reasons why your business wins when you invest in #CloudSecurity. 

Download the white paper: 
ow.ly/3H6E50Xbt92

In today’s digital-first world, businesses rely on SaaS applications and cloud platforms to accelerate growth, collaboration, and innovation. bit.ly/3vgw3Rn #eScan #CloudSecurity #SaaSProtection #Cybersecurity #SecureEveryWorkflow #EmpowerEveryMove

escan_tweet's tweet image. In today’s digital-first world, businesses rely on SaaS applications and cloud platforms to accelerate growth, collaboration, and innovation. 
bit.ly/3vgw3Rn
#eScan #CloudSecurity #SaaSProtection #Cybersecurity #SecureEveryWorkflow #EmpowerEveryMove

Ready to level up your #cloudsecurity game? 🔒 Master Azure's robust security features & prep for AZ-500. Become the security champion your IT needs: bit.ly/49v5iOh #azure #microsoft #training #certification #learningpath

SecurityTube's tweet image. Ready to level up your #cloudsecurity game? 🔒 Master Azure's robust security features & prep for AZ-500. Become the security champion your IT needs: bit.ly/49v5iOh

#azure #microsoft #training #certification #learningpath

Ayush Priya, Lead Data & Cloud Security Engineer @ CRED. He’ll share strategies to secure sensitive information in cloud-native environments using encryption, access controls, and advanced threat detection. #CyberSecurity #CloudSecurity #DataProtection #Infosec

_c0c0n_'s tweet image. Ayush Priya, Lead Data & Cloud Security Engineer @ CRED.

He’ll share strategies to secure sensitive information in cloud-native environments using encryption, access controls, and advanced threat detection.

#CyberSecurity #CloudSecurity #DataProtection #Infosec

Day 3 of My Cloud Security Journey ☁️ IaaS: secure OS+. PaaS: secure app+. SaaS: secure users & data. Cloud ≠ someone else’s problem. 🔗 [linkedin.com/posts/ifedayo-…] #CloudSecurity #PhantomSec @cybergirl_io @cyber_combat @cyber_razz @chovwenofuru @emperoredetan @Ox_HayWhy

PhantomSecDY's tweet image. Day 3 of My Cloud Security Journey ☁️

IaaS: secure OS+.
PaaS: secure app+.
SaaS: secure users & data.
Cloud ≠ someone else’s problem.
🔗 [linkedin.com/posts/ifedayo-…]
#CloudSecurity #PhantomSec

@cybergirl_io @cyber_combat @cyber_razz @chovwenofuru @emperoredetan @Ox_HayWhy

𝐇𝐨𝐰 𝐂𝐥𝐨𝐮𝐝 𝐒𝐭𝐨𝐫𝐚𝐠𝐞 𝐏𝐫𝐨𝐭𝐞𝐜𝐭𝐬 𝐘𝐨𝐮𝐫 𝐃𝐚𝐭𝐚 𝐟𝐫𝐨𝐦 𝐋𝐨𝐬𝐬 𝐚𝐧𝐝 𝐓𝐡𝐞𝐟𝐭 Your data deserves more than a hard drive! ☁️ Learn how cloud storage defends against theft, loss, and cyberattacks. Stay secure in 2025. #CloudSecurity #DataProtection

analyticsinme's tweet image. 𝐇𝐨𝐰 𝐂𝐥𝐨𝐮𝐝 𝐒𝐭𝐨𝐫𝐚𝐠𝐞 𝐏𝐫𝐨𝐭𝐞𝐜𝐭𝐬 𝐘𝐨𝐮𝐫 𝐃𝐚𝐭𝐚 𝐟𝐫𝐨𝐦 𝐋𝐨𝐬𝐬 𝐚𝐧𝐝 𝐓𝐡𝐞𝐟𝐭 

Your data deserves more than a hard drive! ☁️ Learn how cloud storage defends against theft, loss, and cyberattacks. Stay secure in 2025.

#CloudSecurity #DataProtection…

☁️ The 2025 Latio Cloud Security Market Report by James Berthoty confirms the #cloudsecurity market is evolving to Continuous Threat Exposure Management (#CTEM) for unified risk. That’s why we’re excited Tenable is recognized for leading the charge on this strategic shift. 📊...

EAlexStark's tweet image. ☁️ The 2025 Latio Cloud Security Market Report by James Berthoty confirms the #cloudsecurity market is evolving to Continuous Threat Exposure Management (#CTEM) for unified risk. That’s why we’re excited Tenable is recognized for leading the charge on this strategic shift. 📊...

Day 17 of #LearnAWSInPublic Mastering cloud governance & compliance today: CloudWatch & CloudTrail: For monitoring & auditing. AWS Config & Audit Manager: For continuous compliance checks. Control Tower: For governing a multi-account setup. #AWS #CloudSecurity

JustJoshthenoob's tweet image. Day 17 of #LearnAWSInPublic 

Mastering cloud governance & compliance today:

CloudWatch & CloudTrail: For monitoring & auditing.

AWS Config & Audit Manager: For continuous compliance checks.

Control Tower: For governing a multi-account setup.

#AWS #CloudSecurity

We’re excited to welcome Shaleen Dev P.K. & Joshua Bahirvani @ Microsoft as they demonstrate strategies to disrupt fake digital identities and automated abuse in cloud environments. #CyberSecurity #CloudSecurity #Infosec #ThreatIntel #AIsecurity

_c0c0n_'s tweet image. We’re excited to welcome Shaleen Dev P.K. & Joshua Bahirvani @ Microsoft as they demonstrate strategies to disrupt fake digital identities and automated abuse in cloud environments.

#CyberSecurity #CloudSecurity #Infosec #ThreatIntel #AIsecurity

📌Big data. Bigger risks. Your cloud needs strong security to stay safe from leaks and breaches. Join @innovationhubug on the professional talk for insights on must secure areas in cloud protectioin. #DataProtection #Innovationhubug #CloudSecurity

hafswa_nalwoga's tweet image. 📌Big data. Bigger risks.
Your cloud needs strong security to  stay safe from leaks and breaches.

Join @innovationhubug on the professional talk for insights on must secure areas in cloud protectioin. #DataProtection #Innovationhubug #CloudSecurity

From compliance to containers—secure your AWS stack with: ✅ NIST, PCI DSS, GDPR ✅ Serverless & IoT protection ✅ Multi-cloud & hybrid strategies Built for cloud pros & security enthusiasts. 🛡️ #CloudSecurity #AWS #DevSecOps #CyberResilience 🔗 ow.ly/VQ7H50X6qT6

Apress's tweet image. From compliance to containers—secure your AWS stack with:

✅ NIST, PCI DSS, GDPR
✅ Serverless & IoT protection
✅ Multi-cloud & hybrid strategies

Built for cloud pros & security enthusiasts. 🛡️ #CloudSecurity #AWS #DevSecOps #CyberResilience

🔗 ow.ly/VQ7H50X6qT6

☁️ Your cloud has public exposure you don't know about. Run these 6 commands. Find what's exposed. Fix it before attackers do. 🔎 📌 Save this for your next incident review. #CloudSecurity #AWS #Azure #SOC #CyberDefenders

CyberDefenders's tweet image. ☁️ Your cloud has public exposure you don't know about.
Run these 6 commands. Find what's exposed. Fix it before attackers do. 🔎
📌 Save this for your next incident review.
#CloudSecurity #AWS #Azure #SOC #CyberDefenders

🔐 Nearly 80% of breaches in 2025 involve stolen credentials. We reviewed the 8 best enterprise password managers for 2025, comparing features, pricing, and ideal use cases. 👉 See the full list: techrepublic.com/article/enterp… #Cybersecurity #CloudSecurity #PasswordManager #Infosec

TechRepublic's tweet image. 🔐 Nearly 80% of breaches in 2025 involve stolen credentials.

We reviewed the 8 best enterprise password managers for 2025, comparing features, pricing, and ideal use cases.

👉 See the full list: techrepublic.com/article/enterp… 

#Cybersecurity #CloudSecurity #PasswordManager #Infosec…

Defeating malicious hackers seems unlikely, so it is better to be aware of the most common threats and prepare with proactive and reactive strategies to match the risks. RT @antgrasso #CloudComputing #CloudSecurity #CyberAttacks

StrategyNDigita's tweet image. Defeating malicious hackers seems unlikely, so it is better to be aware of the most common threats and prepare with proactive and reactive strategies to match the risks. RT @antgrasso #CloudComputing #CloudSecurity #CyberAttacks

#KubeCon2025 is almost here! 🚀 Will we see you at booth #730? Join us from Nov 10-13 for a live demo of our Cloud SIEM and to see Dojo AI in action. We can’t wait to connect with customers, partners, and fellow security pros. Counting down the days! #CloudSIEM #CloudSecurity

SumoLogic's tweet image. #KubeCon2025 is almost here! 🚀 Will we see you at booth #730?

Join us from Nov 10-13 for a live demo of our Cloud SIEM and to see Dojo AI in action. We can’t wait to connect with customers, partners, and fellow security pros. Counting down the days!

#CloudSIEM #CloudSecurity

Day 36–39 of #100DaysOfCyberSecurity Busy weekend learning DHCP & DNS and running a Wireshark packet capture! Captured DNS traffic (UDP), analyzed IPs, MACs, ports & packet sizes. Learned: DNS uses UDP (port 53) for fast, connectionless name-to-IP translations. #CloudSecurity

gladyuk16403's tweet image. Day 36–39 of #100DaysOfCyberSecurity 
Busy weekend learning DHCP & DNS and running a Wireshark packet capture!

Captured DNS traffic (UDP), analyzed IPs, MACs, ports & packet sizes.
 Learned: DNS uses UDP (port 53) for fast, connectionless name-to-IP translations.
#CloudSecurity

In a world where cyber threats evolve faster than ever, securing your cloud environment demands more than traditional protection — it requires AI that never sleeps and defenses that adapt in real time. escanav.com/en/online-stor… #eScan #CloudSecurity #AIPoweredSecurity #ZeroTrust

escan_tweet's tweet image. In a world where cyber threats evolve faster than ever, securing your cloud environment demands more than traditional protection — it requires AI that never sleeps and defenses that adapt in real time.

escanav.com/en/online-stor…
#eScan #CloudSecurity #AIPoweredSecurity #ZeroTrust

📈 Cloud misconfigs = security & compliance risk. Oct 21, learn how to shift left with org-level controls that enforce good policy by default across AWS, Azure & GCP. 🔗 buff.ly/XlLq0a2 #CloudSecurity #CloudGovernance #SEC510 #Compliance

SANSCloudSec's tweet image. 📈 Cloud misconfigs = security & compliance risk.

Oct 21, learn how to shift left with org-level controls that enforce good policy by default across AWS, Azure & GCP.

🔗 buff.ly/XlLq0a2

#CloudSecurity #CloudGovernance #SEC510 #Compliance

Ready to level up your #cloudsecurity game? 🔒 Master Azure's robust security features & prep for AZ-500. Become the security champion your IT needs: bit.ly/42LHstr #azure #microsoft #training #certification #learningpath

INEsecurity's tweet image. Ready to level up your #cloudsecurity game? 🔒 Master Azure's robust security features & prep for AZ-500. Become the security champion your IT needs: bit.ly/42LHstr

#azure #microsoft #training #certification #learningpath

Loading...

Something went wrong.


Something went wrong.


United States Trends