Redshift Security: Attack Surface Explained
In our previous two posts, Access and Data Flows and Data Backups and Encryption, we discussed security best practices to implement least-privileged access on Redshift and reduce the static risk...
View ArticleHow to Build an Enterprise Data Security Team
Leading a data security company comes with great responsibility. A good chunk of my time is spent with security leaders discussing top-of-mind trends and topics. One trend I’ve come across is the...
View ArticleAnnouncing Prisma Cloud AI-SPM: Security and Compliance for AI-Powered Apps
As artificial intelligence (AI) becomes ubiquitous, it introduces security challenges that have never been considered. AI security posture management (AI-SPM) is a new set of capabilities that...
View ArticleAre Cloud Serverless Functions Exposing Your Data?
More than 25% of all publicly accessible serverless functions have access to sensitive data, as seen in internal research. The question then becomes, Are cloud serverless functions exposing your data?...
View ArticleDSPM-Driven Data Context to Improve Attack Path Analysis and Prioritization
Prioritization might be the biggest challenge in modern cloud security. Cloud environments are complex, often comprising hundreds of services and thousands of cloud resources. This disparate and...
View ArticleIs Your Snowflake Data at Risk? Find and Protect Sensitive Data with DSPM
In recent months, there’s been increased scrutiny of data managed in third-party applications. A spate of reported security incidents has highlighted the need for effective monitoring of sensitive data...
View ArticlePrisma Cloud Innovations: September's Highlights
Prisma Cloud's September 2024 release packs a punch with seven impactful updates to enhance your cloud security and user experience. Discover the Latest Features and Important Insights to Keep Your...
View ArticleUnderstanding the Costs and Benefits of DSPM Tools
The following article is an abridged version of our new Prisma Cloud datasheet Understanding the True Costs of a DSPM Solution. Today’s organizations face an uphill battle when it comes to protecting...
View ArticleData Security, Meet Remediation: Introducing the New Integration Between...
Remediation has long been a sore spot in data security posture management (DSPM). Many of the currently available solutions are great at surfacing alerts but offer no real way for Security teams to...
View ArticleRedshift Security: Data Backups and Encryption Best Practices
In this blog post, second in a series, we focus on risks that come from a misconfigured Redshift, like encryption, backups and logs. We’ll explore security features and best practices that can prevent...
View Article