cloud security

Common cloud security mistakes and how to avoid them

Common cloud security mistakes and how to avoid them 2024-02-07 at 08:01 By Helga Labus According to recent surveys, 98% of organizations keep their financial, business, customer and/or employee information in the cloud but, at the same time, 95% of cloud security professionals are not sure their security protections and their team would manage to […]

React to this headline:

Loading spinner

Common cloud security mistakes and how to avoid them Read More »

How CISOs navigate policies and access across enterprises

How CISOs navigate policies and access across enterprises 2024-02-06 at 08:01 By Mirko Zorz In this Help Net Security interview, Marco Eggerling, Global CISO at Check Point, discusses the challenge of balancing data protection with diverse policies, devices, and access controls in a distributed enterprise. He also highlights the significance of security validations, especially internal

React to this headline:

Loading spinner

How CISOs navigate policies and access across enterprises Read More »

Migrating to the cloud: An overview of process and strategy

Migrating to the cloud: An overview of process and strategy 2024-02-05 at 06:01 By Help Net Security Over the next few years, the number of organizations navigating to the cloud to advance their business goals is expected to grow exponentially. According to Gartner, more than 70% of enterprises will use cloud platforms to accelerate their

React to this headline:

Loading spinner

Migrating to the cloud: An overview of process and strategy Read More »

‘Leaky Vessels’ Container Escape Vulnerabilities Impact Docker, Others 

‘Leaky Vessels’ Container Escape Vulnerabilities Impact Docker, Others  2024-02-01 at 18:01 By Eduard Kovacs Snyk discloses information on Leaky Vessels, several potentially serious container escape vulnerabilities affecting Docker and others. The post ‘Leaky Vessels’ Container Escape Vulnerabilities Impact Docker, Others  appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original

React to this headline:

Loading spinner

‘Leaky Vessels’ Container Escape Vulnerabilities Impact Docker, Others  Read More »

Orca Flags Dangerous Google Kubernetes Engine Misconfiguration

Orca Flags Dangerous Google Kubernetes Engine Misconfiguration 2024-01-24 at 17:48 By Ionut Arghire Attackers could take over a Kubernetes cluster if access privileges are granted to all authenticated users in Google Kubernetes Engine. The post Orca Flags Dangerous Google Kubernetes Engine Misconfiguration appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

Orca Flags Dangerous Google Kubernetes Engine Misconfiguration Read More »

Cloud security predictions for 2024

Cloud security predictions for 2024 2024-01-12 at 07:31 By Help Net Security As we reflect on the cybersecurity landscape and the trajectories of threat vectors, it’s evident that we’re on the cusp of a paradigm shift in cloud security. Businesses and cybersecurity professionals must stay abreast of these changes, adapting their strategies to ensure a

React to this headline:

Loading spinner

Cloud security predictions for 2024 Read More »

DriveFS Sleuth: Open-source tool for investigating Google Drive File Stream’s disk forensic artifacts

DriveFS Sleuth: Open-source tool for investigating Google Drive File Stream’s disk forensic artifacts 2024-01-04 at 07:31 By Mirko Zorz DriveFS Sleuth automates the investigation of Google Drive File Stream disk artifacts. The tool can parse the disk artifacts and build a filesystem tree-like structure enumerating the synchronized files along with their respective properties. “While engaged

React to this headline:

Loading spinner

DriveFS Sleuth: Open-source tool for investigating Google Drive File Stream’s disk forensic artifacts Read More »

SentinelOne Snaps up Seed-Stage CNAPP Startup PingSafe

SentinelOne Snaps up Seed-Stage CNAPP Startup PingSafe 2024-01-03 at 22:01 By Ryan Naraine SentinelOne plans to acquire PingSafe in a cash-and-stock deal that adds cloud native application protection platform (CNAPP) technologies. The post SentinelOne Snaps up Seed-Stage CNAPP Startup PingSafe appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original

React to this headline:

Loading spinner

SentinelOne Snaps up Seed-Stage CNAPP Startup PingSafe Read More »

Are Security Appliances fit for Purpose in a Decentralized Workplace?

Are Security Appliances fit for Purpose in a Decentralized Workplace? 2024-01-02 at 21:01 By Etay Maor Security appliances are amongst the most riskiest enterprise devices and are a often method for threat actors to infiltrate a business. The post Are Security Appliances fit for Purpose in a Decentralized Workplace? appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Are Security Appliances fit for Purpose in a Decentralized Workplace? Read More »

Vulnerabilities in Google Kubernetes Engine Could Allow Cluster Takeover

Vulnerabilities in Google Kubernetes Engine Could Allow Cluster Takeover 2023-12-29 at 14:02 By Ionut Arghire Two flaws in Google Kubernetes Engine could be exploited to escalate privileges and take over the Kubernetes cluster. The post Vulnerabilities in Google Kubernetes Engine Could Allow Cluster Takeover appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Vulnerabilities in Google Kubernetes Engine Could Allow Cluster Takeover Read More »

Tackling cloud security challenges head-on

Tackling cloud security challenges head-on 2023-12-26 at 07:32 By Help Net Security Cloud security is a critical aspect of modern computing, as businesses and individuals increasingly rely on cloud services to store, process, and manage data. Cloud computing offers numerous benefits, including scalability, flexibility, and cost efficiency, but it also introduces unique security challenges that

React to this headline:

Loading spinner

Tackling cloud security challenges head-on Read More »

Cisco to Acquire Isovalent, Add eBPF Tech to Cloud Portfolio

Cisco to Acquire Isovalent, Add eBPF Tech to Cloud Portfolio 21/12/2023 at 23:32 By Ryan Naraine Isovalent raised about 70 million in funding from prominent investors including Microsoft’s venture fund, Google, and Andreessen Horowitz. The post Cisco to Acquire Isovalent, Add eBPF Tech to Cloud Portfolio appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Cisco to Acquire Isovalent, Add eBPF Tech to Cloud Portfolio Read More »

New AI Safety Initiative Aims to Set Responsible Standards for Artificial Intelligence

New AI Safety Initiative Aims to Set Responsible Standards for Artificial Intelligence 13/12/2023 at 21:32 By SecurityWeek News Major software vendors sign on to a new security initiative to create trusted best practices for artificial intelligence deployments. The post New AI Safety Initiative Aims to Set Responsible Standards for Artificial Intelligence appeared first on SecurityWeek.

React to this headline:

Loading spinner

New AI Safety Initiative Aims to Set Responsible Standards for Artificial Intelligence Read More »

Short-term AWS access tokens allow attackers to linger for a longer while

Short-term AWS access tokens allow attackers to linger for a longer while 07/12/2023 at 17:32 By Zeljka Zorz Attackers usually gain access to an organization’s cloud assets by leveraging compromised user access tokens obtained via phishing, by using malware, or by finding them in public code repositories. These are long-term access tokens associated with an

React to this headline:

Loading spinner

Short-term AWS access tokens allow attackers to linger for a longer while Read More »

Microsoft Hires New CISO in Major Security Shakeup

Microsoft Hires New CISO in Major Security Shakeup 06/12/2023 at 20:31 By Ryan Naraine Microsoft announced a major shakeup of its security hierarchy, removing the CISO and Deputy CISO and handing the reins to a recent hire who previously served as CTO and President at Bridgewater. The post Microsoft Hires New CISO in Major Security

React to this headline:

Loading spinner

Microsoft Hires New CISO in Major Security Shakeup Read More »

Top Guns: Defending Corporate Clouds from Malicious Mavericks

Top Guns: Defending Corporate Clouds from Malicious Mavericks 04/12/2023 at 19:49 By Tom Eston While applications and cloud infrastructure present different risk profiles and require different security assessments, they must not be viewed separately with regards to enterprise defense. The post Top Guns: Defending Corporate Clouds from Malicious Mavericks appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Top Guns: Defending Corporate Clouds from Malicious Mavericks Read More »

Bridging the gap between cloud vs on-premise security

Bridging the gap between cloud vs on-premise security 01/12/2023 at 08:03 By Help Net Security With the proliferation of SaaS applications, remote work and shadow IT, organizations feel obliged to embrace cloud-based cybersecurity. And rightly so, because the corporate resources, traffic, and threats are no longer confined within the office premises. Cloud-based security initiatives, such

React to this headline:

Loading spinner

Bridging the gap between cloud vs on-premise security Read More »

Amazon One Enterprise Enables Palm-Based Access to Physical Locations, Digital Assets

Amazon One Enterprise Enables Palm-Based Access to Physical Locations, Digital Assets 28/11/2023 at 17:17 By Eduard Kovacs AWS announces Amazon One Enterprise, a palm-based identity service that enables users to easily access physical locations and digital assets. The post Amazon One Enterprise Enables Palm-Based Access to Physical Locations, Digital Assets appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Amazon One Enterprise Enables Palm-Based Access to Physical Locations, Digital Assets Read More »

Researchers Discover Dangerous Exposure of Sensitive Kubernetes Secrets

Researchers Discover Dangerous Exposure of Sensitive Kubernetes Secrets 22/11/2023 at 20:31 By Ryan Naraine Researchers at Aqua call urgent attention to the public exposure of Kubernetes configuration secrets, warning that hundreds of organizations are vulnerable to this “ticking supply chain attack bomb.” The post Researchers Discover Dangerous Exposure of Sensitive Kubernetes Secrets appeared first on

React to this headline:

Loading spinner

Researchers Discover Dangerous Exposure of Sensitive Kubernetes Secrets Read More »

Traditional cloud security isn’t up to the task

Traditional cloud security isn’t up to the task 17/11/2023 at 09:02 By Help Net Security In the last year, 47% of all data breaches originated in the cloud, and more than 6 in 10 respondents believe cloud security is lacking and poses a severe risk to their business operations, according to Illumio. The average organization

React to this headline:

Loading spinner

Traditional cloud security isn’t up to the task Read More »

Buy Me A Coffee
Thank you for visiting!