Monthly Archives: February 2025

Implementing CCM: The Change Management Process

The Cloud Controls Matrix (CCM) is a framework of controls (policies, procedures, and technical measures) that are essential for cloud computing security. It is created and updated by CSA and aligned to CSA best practices. You can use CCM to systematically assess and guide the security of any cloud implementation. CCM also provides guidance on […]

7 Cloud Security Mistakes You May Not Realize You’re Making

Originally published by Seiso. Written by Eric Lansbery.   With every new tool or layer of protection, complexity grows—along with risks. Many organizations unknowingly make common security mistakes, such as misconfigurations, reliance on manual processes, and fragmented team efforts, leaving their cloud environments vulnerable despite significant investments.   Why is Cloud Security is Becoming More Complex? […]

⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma

Welcome to your weekly roundup of cyber news, where every headline gives you a peek into the world of online battles. This week, we look at a huge crypto theft, reveal some sneaky AI scam tricks, and discuss big changes in data protection. Let these stories spark your interest and help you understand the changing […]

Becoming Ransomware Ready: Why Continuous Validation Is Your Best Defense

Ransomware doesn’t hit all at once—it slowly floods your defenses in stages. Like a ship subsumed with water, the attack starts quietly, below the surface, with subtle warning signs that are easy to miss. By the time encryption starts, it’s too late to stop the flood.  Each stage of a ransomware attack offers a small […]

Google Cloud KMS Adds Quantum-Safe Digital Signatures to Defend Against Future Threats

Google Cloud has announced quantum-safe digital signatures in Google Cloud Key Management Service (Cloud KMS) for software-based keys as a way to bulletproof encryption systems against the threat posed by cryptographically-relevant quantum computers. The feature, currently in preview, coexists with the National Institute of Standards and Technology’s (NIST) post-quantum cryptography (PQC)

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies. Click More Info to view Privacy Policy.