All you need to know about protecting SaaS apps and data in the cloud
![S3 Bucket Misconfiguration: Common Oversights and Their Fixes](/static/de7396bc58775c924174c3c9f2467bbe/888e2/23_blog-cover-photo.webp)
MisconfigurationsFriday, September 16, 2022
S3 Bucket Misconfiguration: Common Oversights and Their Fixes
![HIPAA Compliance in the Cloud](/static/a5a74cb3a5c0bbe6245522ebcb01ed03/888e2/22_blog-cover-photo.webp)
![A Guide to Cloud Security Best Practices](/static/ede7e98a6093188a6e7edee54d1956fd/888e2/21-cover-01-min.webp)
![Best Practices for Securing Databases in the Cloud](/static/79c9688bfcbf26210f6ca16250401cb0/888e2/20_blog-cover-photo.webp)
Cloud SecurityFriday, August 26, 2022
Best Practices for Securing Databases in the Cloud
![Protecting Data at Rest Using Encryption](/static/4c004ae5409e8873ac3b77d3e3668417/888e2/19_blog-cover-photo.webp)
Cloud SecurityEncryptionSaturday, August 20, 2022
Protecting Data at Rest Using Encryption
![How to Check for Least Privilege with Cyscale’s New Identity Dashboard](/static/fbc039617d686e9adb5447d24c4ef5e3/888e2/blog_18-cover.webp)
ProductMonday, August 15, 2022
How to Check for Least Privilege with Cyscale’s New Identity Dashboard
![Types of Encryption for in Motion, in Use, at Rest Data](/static/5e96b8c90dae2186df631d9c5489b68e/888e2/blog_17-cover-image.webp)
EncryptionTuesday, August 9, 2022
Types of Encryption for in Motion, in Use, at Rest Data
![SOC 2 Compliance in The Cloud](/static/1bda2a701dc2eedacc68ebf07ba12030/888e2/blog_16-soc2.webp)
![5 Hybrid Cloud Best Practices](/static/dd9fa6fe457aea015d622ef44f1b225a/888e2/blog_15-hybrid-cloud-best-practices.webp)