Articles

CloudSecurity

Penetration-Testing-Methodologies-for-Cloud-Applications-Mobile
Penetration Testing Methodologies for Cloud Applications

EC-Council’s whitepaper on Penetration Testing Methodologies for Cloud Applications, authored by Mirza Khasim, Senior Principal IT Security Analyst at Oracle, delves into the importance of conducting regular penetration testing of cloud-based applications to identify potential security vulnerabilities and mitigate them before malicious actors can exploit them. The whitepaper provides a comprehensive overview of the various…

Read article
How-Organizations-Are-Handling-the-Cloud-Security-Skills-Gap-Mobile
How Organizations Are Handling the Cloud Security Skills Gap in 2023

EC-Council’s latest whitepaper, “How Organizations Are Handling the Cloud Security Skills Gap in 2023,” authored by Kimberly Mentzell, Cybersecurity Program Manager at the Maryland Department of Commerce, provides valuable insights into the current state of cloud security skills gap and how organizations are addressing this challenge. The whitepaper highlights that cloud adoption has accelerated rapidly…

Read article
Cybersecurity-in-the-Cloud-Threat-Eradication,-Protection,-and-Recovery-Mobile
Cybersecurity in the Cloud: Threat Eradication, Protection, and Recovery

EC-Council’s whitepaper on Cybersecurity in the Cloud: Threat Eradication, Protection, and Recovery by Satyavathi Divadari, CyberRes Cloud CTO and Head of Enterprise Security Architecture at Micro Focus, provides valuable insights into the threats faced by organizations using cloud-based services and the measures required to protect against them. The whitepaper highlights the increasing adoption of cloud…

Read article
Disseminating-Cyberthreat-Intelligence-to-Enhance-Information-Security
Disseminating Cyberthreat Intelligence to Enhance Information Security

EC-Council’s whitepaper, “Disseminating Cyberthreat Intelligence to Enhance Information Security,” authored by Susan Villaquiral Cortés, CISO and COO at ArkNova SAS, focuses on the importance of cyber threat intelligence (CTI) in improving information security posture. The whitepaper aims to provide a comprehensive guide to organizations on implementing a CTI program and sharing CTI with the broader…

Read article