cybercloud
-
Best Practices
Microsoft’s Role in Developing the NIST Zero Trust Best Practices
Microsoft was one of 24 industry partners in NIST’s National Cybersecurity Center of Excellence (NCCoE) consortium, participating in the largest…
Read More » -
Best Practices
Unlocking Zero Trust with Microsoft Entra in the Era of AI
Microsoft Entra, a family of identity and access management (IAM) solutions, provides a comprehensive platform to implement Zero Trust principles.
Read More » -
Vendor Profile
Securing 75K Endpoints in 60 Days | BlueVoyant + Microsoft Protect Against Cyber Threats
BlueVoyant utilized Microsoft Defender for Endpoint, an enterprise-grade platform for endpoint detection and response (EDR), to secure the 75,000 endpoints.
Read More » -
Vendor Profile
Endor Labs Enhances Microsoft Security with End to End DevSecOps Capability in an Era of AI
Endor Labs address critical gaps in software supply chain security, vulnerability prioritization, and emerging threats like AI-driven development.
Read More » -
Best Practices
Fortifying Browser Security: A Zero Trust Approach
Exploring the Zero Trust approach to browser security, its core principles, implementation strategies, and emerging technologies driving its adoption.
Read More » -
Industry Insights
The AI Cybersecurity Future is Here
AI will have a profoundly transformational impact upon cybersecurity, both in terms of how it is used by attackers and…
Read More » -
Best Practices
Making Zero Trust Real: Top 10 Security Controls You Can Implement Now
Learn practical security controls you can implement today using tools you likely already have. This session offers technical guidance to…
Read More » -
Vendor Profile
How AI Is Evolving Security Operations And What Humans Still Do Best
Chas Clawson explains how SOC teams can accelerate detection and response, cut through alert noise, and improve security outcomes by…
Read More » -
Implementing Security Solutions
Zscaler’s Zero Trust Security: Protecting Enterprises in the AI Era
Built on the principle of “never trust, always verify,” Zscaler’s cloud-native Zero Trust Exchange platform redefines cybersecurity.
Read More » -
Designing Security Systems
Steps toward a Zero Trust architecture on AWS
Implement AWS Verified Access (AVA) to provide secure, VPN-less access to non-HTTP(S) resources (e.g., SSH, RDP, databases) using Zero Trust…
Read More »