Friday, January 16, 2026

Firewall Challenge Week 3 – DEV Community

Keep Your Ubuntu-based VPN Server Up to Date

Enterprise-Grade Security for Small Businesses with Linux and Open Source

Ethics for Ephemeral Signals – A Manifesto

When Regex Falls Short – Auditing Discord Bots with AI Reasoning Models

Cisco Live 2025: Bridging the Gap in the Digital Workplace to Achieve ‘Distance Zero’

Agentforce London: Salesforce Reports 78% of UK Companies Embrace Agentic AI

WhatsApp Aims to Collaborate with Apple on Legal Challenge Against Home Office Encryption Directives

AI and the Creative Industries: A Misguided Decision by the UK Government

Choosing the Best Cloud Security Provider for Data Protection

Cloud security can be intimidating for CISOs and risk practitioners, with concerns about data ownership and access. However, cloud computing actually offers enhanced observability through APIs that require authentication, authorization, and auditing for every action. As more organizations embrace public cloud for its benefits, including security protections and the ability to respond to threats in real-time, it is important to ensure data protection and validate cloud providers’ security measures.

One key consideration is data location and access control, including where authentication credentials are stored and accessed. Encryption and key management are essential for protecting data, with services like AWS KMS simplifying the process of managing keys. Organizations can also verify their cloud provider’s security claims through compliance certifications and third-party audits.

By leveraging cloud-native security solutions, organizations can align security measures with business objectives and choose the most effective security solutions. This approach allows for a tailored security strategy based on individual needs rather than a one-size-fits-all solution. Stephen McDermid, EMEA CSO at Okta, emphasizes the importance of maximizing cloud security capabilities to meet both business and security goals.