Introducing FireMon Policy Analyzer Learn More

Cloud Security Operations

Copy (2) of Copy of Page Header

The Grand Unified Theory of Cloud Governance

One of the toughest lessons I’ve learned as I’ve spent over a decade of my life helping organizations build…
Schrodingers Header

Schrödinger’s Misconfigurations

It’s Thursday afternoon and you’re getting ready to leave work a little early because… you can. But then that…
Page Header Blog- how to select a

How to Select a Change Management Solution

The most common threat to business security is accidental firewall and cloud security group misconfiguration…
Copy (1) of Copy of Copy (2) of Copy of Page Header copy

Ransomware is in the Cloud

Visibility, monitoring, and collaboration are the keys to identifying and preventing ransomware from breaching your…
Copy (1) of Copy of Copy (2) of Copy of Page Header copy (1) (1)

Implications of the AuthN/AuthZ Gap

It’s become common knowledge that in cloud, “identity is the new perimeter”. It’s a nice phrase that’s …
Blog- Goodbye and Hello-1440x440-px

Goodbye “Kill Chains”, Hello “Attack Sequences”

A few years ago at the RSA Conference I co-presented on the top cloud attack “kill chains”. Shawn Harris…
FireMon Blog Header 9

3 Steps to Reduce Risk in Your Cloud Environment(s)

Cloud security risk management should be the same as reducing risk on-premise. Yet more than half of …
FireMon Blog Header 8

Hybrid Cloud Security Best Practices: Top Cloud Security Challenges

Without question, public cloud providers have made the deployment of applications and services simpler …
FireMon Blog Header 9

Building Security into Your Cloud-First Business

Digital transformation is the overhauling of an entire organization – business model, technologies, processes…