Archive for the ‘Cloud computing’ Category

Human hacking increased as apps and browsers moved completely to the cloud

“Today’s hyper-targeted spear phishing attacks, coming at users from all digital channels, are simply not discernable to the human eye. Add to that the increasing number of attacks coming from legitimate infrastructure, and the reason phishing is the number one thing leading to disruptive ransomware attacks is obvious.” Human interaction online has largely moved to […]

Leave a Comment

Supply Chain Emerging as Cloud Security Threat

Misconfigurations in software development environments and poor security hygiene in the supply chain can impact cloud infrastructure and offer opportunities for malicious actors to control unwitting victims’ software development processes. These were the results of a report from Palo Alto Networks’ security specialist Unit 42, which conducted a red team exercise with a large SaaS provider. […]

Leave a Comment

IBM Report Shows Severity of Cloud Security Challenges

IBM Security Services today published a report detailing a raft of issues pertaining to cloud security, including the fact that there are nearly 30,000 cloud accounts potentially for sale on dark web marketplaces. The report is based on dark web analysis, IBM Security X-Force Red penetration testing data, IBM Security Services metrics, X-Force Incident Response analysis and […]

Leave a Comment

Keys to the cloud: Unlocking digital transformation to enhance national security

This, paired with the “anything you can do, I can do better” mantra adopted by today’s nation-state threat actors, has left mission-critical information vulnerable to attack as it undergoes the great cloud migration. These agile threat actors – without any red tape to stand in their way – have already adopted a cloud-centric mindset, oftentimes at […]

Leave a Comment

Operationalize AWS security responsibilities in the cloud

What do AWS Partners with Level 1 Managed Security Service (MSSP) Competency provide? All AWS Level 1 MSSP Competency Partners provide at minimum the ten 24/7 security monitoring, protection, and remediation services as defined in the Level 1 Managed Security Services baseline. Those ten 24/7 services specifically are below. Many of the Level 1 MSSP […]

Leave a Comment

The 3 Rs of visibility for any cloud journey

While Security Orchestration Automation and Response (SOAR) solutions help automate and structure these activities, the activities themselves require telemetry data that provide the breadcrumbs to help scope, identify and potentially remedy the situation. This takes increasing significance in the cloud for a few reasons: The public cloud shared security model may lead to gaps in the telemetry (e.g., lack […]

Leave a Comment

For Hackers, APIs are Low-Hanging Fruit

By 2022, API abuses will become the most frequent attack vector, predicts Gartner. We’re already witnessing new API exploits reach the headlines on a near-daily basis. Most infamous was the Equifax breach, an attack that exposed 147 million accounts in 2017. Since then, many more API breaches and major vulnerabilities have been detected at Experian, Geico, Facebook, Peleton and […]

Leave a Comment

US CISA and NSA publish guidance to secure Kubernetes deployments

It guides system administrators and developers of National Security Systems on how to deploy Kubernetes with example configurations for the recommended hardening measures and mitigations. Below is the list of mitigations provided by the US agencies: Scan containers and Pods for vulnerabilities or misconfigurations. Run containers and Pods with the least privileges possible. Use network […]

Leave a Comment

Why isn’t cloud backup part of common security practices?

Further, a recent Sophos survey found that the average post-attack remediation costs, including lost business, grew to nearly $2 million per incident in 2021, about 10 times the size of the ransom payment itself. CISOs and hands-on security professionals are implementing several tactics to defend their organization, and these include proactive threat hunting and technical defenses like multi-factor authentication. […]

Leave a Comment

Storing Encrypted Photos in Google’s Cloud

STORING YOUR DATA IN THE CLOUD

Leave a Comment

How is Cloud Infrastructure Security Important for an Organization?

Embracing new technologies lead to qualitative growth but simultaneously holds high chances of quantitative data breaches. While adopting cloud technology, it is important to see the security of cloud infrastructure as one of the crucial responsibilities. There are various organizations out there that are still unsure of the security of their data present in the […]

Leave a Comment

Why Data Protection Cloud Strategies Are Now Mission-Critical

The growing reliance on public cloud services as both a source and repository of mission-critical information means data owners are under pressure to deliver effective protection for cloud-resident applications and data. Indeed, cloud is now front of mind for many IT organisations. According to recent research by Enterprise Strategy Group (ESG) cloud is “very well-perceived by data […]

Leave a Comment

Secure your cloud: Remove the human vulnerabilities

A strong case can be made that shoring up defenses requires “automating out” the weakest link – i.e., humans – from any cloud that companies are entrusting with their data. This applies to their internal, on-premise clouds as well as to the external cloud vendors that they choose to engage with. In “automating out the […]

Leave a Comment

The next big thing in cloud computing?

For some time, the public cloud has actually been able to offer more protection than traditional on-site environments. Dedicated expert teams ensure that cloud servers, for example, maintain an optimal security posture against external threats. But that level of security comes at a price. Those same extended teams increase insider exposure to private data—which leads […]

Leave a Comment

The growing threat to CI/CD pipelines

Today, rapid digitalization has placed a significant burden on software developers supporting remote business operations. Developers are facing continuous pressure to push out software at high velocity. As a result, security is continuously overlooked, as it doesn’t fit into existing development workflows. The way we build software is increasingly automated and integrated. CI/CD pipelines have […]

Leave a Comment

CSA Survey Suggests Cloud Security Is Improving

New research suggests the overall state of cloud security continues to improve at a time when more organizations rely on multiple cloud service providers. A survey of 1,900 security and IT professionals published this week by the Cloud Security Alliance (CSA) in collaboration with AlgoSec, a provider of network security tools, finds only 11% of respondents said they encountered […]

Leave a Comment

Cloud security experts wanted: You can be one of them

Leave a Comment

Taking a Security-First Approach to Cloud Migration

The pandemic and lockdowns hit their first anniversary mark, and many companies continue to have their employees work from home for the foreseeable future. Over the past year, organizations have seen how important cloud computing is to business operations. In fact, according to a MariaDB survey, 40% of respondents said that COVID-19 accelerated their migration to […]

Leave a Comment

With data volumes and velocity multiplying, how do you choose the right data security solution?

Choosing the right data security solution Jean Le Bouthillier, CEO of Canadian data security startup Q​ohash​, says that organizations have had many issues with solutions that generate large volumes of (often) not relevant and not actionable data. “My first piece of advice for organizations looking for the right data security solutions would be to consider whether […]

Leave a Comment

Passing a compliance audit in the cloud doesn’t have to be hard

Adding compliance trails in cloud environments The secret to resolving compliance and security issues before they escalate into costly audit penalties is to proactively add an automated compliance and security management system in the cloud environment. This way your company can take advantage of all the security benefits offered by the cloud provider while also managing other […]

Leave a Comment