LevelBlue Blog
Tag: Cloud Security
Pitfalls of Cloud Sprawl and How to Avoid Them
October 17, 2024 | David Balaban
The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article. Cloud computing has become a boon to organizations due to its flexibility, scalability, and cost-effectiveness. However, without proper oversight, it evolves into an untidy collection of… Read more →
The Ins and Outs of Cybersecurity Posture Assessment in 2024
June 26, 2024 | David Balaban
The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article. Whether you're working with on-premises infrastructure, fully embracing the cloud, or running a hybrid solution, one thing is certain: a robust security posture is essential… Read more →
Transitioning from On-Premise Storage to AWS Cloud: A Strategic Guide for Companies
May 30, 2024 | Thomas Jung
The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article. In today’s digital world, businesses face the challenge of managing ever-expanding volumes of data efficiently and securely. Traditional on-premise storage solutions often come with… Read more →
Bulletproofing the Retail Cloud with API Security
January 31, 2024 | Devin Partida
The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article. Application programming interface (API) security is critical for retailers increasingly reliant on cloud technology. However, they also open potential gateways for cyber threats, making robust… Read more →
Ensuring vendor integrity: Why the cloud shouldn’t be your only backup
September 25, 2023 | Zachary Curley
Introduction As a senior consultant I deal with customers across numerous industries and maturity levels. I am often engaged in conducting risk assessments or gap analysis aligned with common frameworks such as the National Institute for Standards and Technology’s (NIST) Cybersecurity Framework (CSF). Most, if not all, the frameworks have a few controls that focus on the organization… Read more →