All you need to know about protecting SaaS apps and data in the cloud
![NIST Compliance in the Cloud](/static/58a6b22e8e1ff42a1cd30d9390d85c90/888e2/32_blog-cover.webp)
![Introducing the New Data Security Dashboard!](/static/43e0601c3a7b0310513f5b284f5266f9/02dc4/blog_30-cover-2.webp)
![Cloud Security and Compliance: A Guide for Your Cloud Infrastructure](/static/dc53ac7e558c823a522ffae0c087148a/d6cae/29_blog-cloud-and-compliance.png)
ComplianceMonday, December 5, 2022
Cloud Security and Compliance: A Guide for Your Cloud Infrastructure
![The New ISO 27001 2022 Version, Explained for the Cloud](/static/656e61f122ae5de3c23f08938e8b0ba6/d6cae/28_blog-new-iso27001.png)
ComplianceWednesday, November 23, 2022
The New ISO 27001 2022 Version, Explained for the Cloud
![Understanding serverless computing: how you can use it and how to secure it](/static/12acbeec855dfb4da8a6b0a9110f6ed0/888e2/27_blog-serverless-computing.webp)
Cloud SecurityThursday, November 17, 2022
Understanding serverless computing: how you can use it and how to secure it
![A Word on Cloud Security](/static/e7d0b79299e2f1d5a1d08d2a9f3629a9/888e2/microsoftteams-image-3-.webp)
![AWS SOC 2 Compliance Checklist: A Detailed Guide](/static/db7c98536037b7995ebf25758763897c/888e2/26-cyscale-blog-min.webp)
ComplianceWednesday, October 19, 2022
AWS SOC 2 Compliance Checklist: A Detailed Guide
![Cloud Queues Security Best Practices](/static/3e43f46e5da4cc8c0e95be4faaff9949/888e2/25_blog-queue-security-cover-photo.webp)
![Cloud Data Security For AWS: An In-Depth Guide](/static/8439e84f30635c75021e87142b3bea7b/888e2/24_blog-cover-photo.webp)
Cloud SecurityThursday, September 29, 2022