Cloud

Azure Kubernetes Services Vulnerability Exposed Sensitive Information

Azure Kubernetes Services Vulnerability Exposed Sensitive Information 2024-08-21 at 14:46 By Ionut Arghire A vulnerability in Azure Kubernetes Services could have allowed attackers to escalate privileges and access sensitive information on the clusters. The post Azure Kubernetes Services Vulnerability Exposed Sensitive Information appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed […]

React to this headline:

Loading spinner

Azure Kubernetes Services Vulnerability Exposed Sensitive Information Read More »

Enhancing threat detection for GenAI workloads with cloud attack emulation

Enhancing threat detection for GenAI workloads with cloud attack emulation 2024-07-29 at 08:01 By Help Net Security Cloud GenAI workloads inherit pre-existing cloud security challenges, and security teams must proactively evolve innovative security countermeasures, including threat detection mechanisms. Traditional cloud threat detection Threat detection systems are designed to allow early detection of potential security breaches;

React to this headline:

Loading spinner

Enhancing threat detection for GenAI workloads with cloud attack emulation Read More »

The gap between business confidence and cyber resiliency

The gap between business confidence and cyber resiliency 2024-07-29 at 06:06 By Help Net Security In this Help Net Security video, Jim Liddle, Nasuni’s Chief Innovation Officer, discusses the findings of its new 2024 industry research report, The Era of Hybrid Cloud Storage. Key takeaways: Cloud strategies are at the forefront of enterprise success. Enterprises

React to this headline:

Loading spinner

The gap between business confidence and cyber resiliency Read More »

Cloudy with a Chance of Cyberattack: Understanding LOTC Attacks and How ZTNA Can Prevent Them

Cloudy with a Chance of Cyberattack: Understanding LOTC Attacks and How ZTNA Can Prevent Them 2024-07-08 at 15:01 By Etay Maor With Living Off the Cloud (LOTC) attacks, hackers abuse APIs of trusted cloud services to remotely control botnets but also to make malicious traffic appear as trusted cloud traffic. The post Cloudy with a

React to this headline:

Loading spinner

Cloudy with a Chance of Cyberattack: Understanding LOTC Attacks and How ZTNA Can Prevent Them Read More »

47% of corporate data stored in the cloud is sensitive

47% of corporate data stored in the cloud is sensitive 2024-07-05 at 07:01 By Help Net Security As the use of the cloud continues to be strategically vital to many organizations, cloud resources have become the biggest targets for cyberattacks, with SaaS applications (31%), cloud storage (30%) and cloud management infrastructure (26%) cited as the

React to this headline:

Loading spinner

47% of corporate data stored in the cloud is sensitive Read More »

4 key steps to building an incident response plan

4 key steps to building an incident response plan 2024-07-04 at 07:01 By Mirko Zorz In this Help Net Security interview, Mike Toole, head of security and IT at Blumira, discusses the components of an effective security incident response strategy and how they work together to ensure organizations can address cybersecurity issues. What are the

React to this headline:

Loading spinner

4 key steps to building an incident response plan Read More »

Enterprises increasingly turn to cloud and AI for database management

Enterprises increasingly turn to cloud and AI for database management 2024-06-27 at 06:01 By Help Net Security Across various tasks, from predictive analytics to code generation, organizations in all sectors are exploring how AI can add value and increase efficiency. In this Help Net Security video, Ryan Booz, PostgreSQL Advocate at Redgate, discusses the key

React to this headline:

Loading spinner

Enterprises increasingly turn to cloud and AI for database management Read More »

GenAI keeps cybersecurity pros on high alert

GenAI keeps cybersecurity pros on high alert 2024-06-13 at 06:01 By Help Net Security “Businesses across every industry face unprecedented challenges posed by an increasing attack surface, zero-day vulnerabilities, cloud misconfigurations, and new emerging threats driven by AI,” said Andrei Florescu, president and GM of Bitdefender Business Solutions Group. “The findings of our recent survey

React to this headline:

Loading spinner

GenAI keeps cybersecurity pros on high alert Read More »

Security and privacy strategies for CISOs in a mobile-first world

Security and privacy strategies for CISOs in a mobile-first world 2024-06-12 at 07:01 By Mirko Zorz In this Help Net Security interview, Jim Dolce, CEO at Lookout, discusses securing mobile devices to mitigate escalating cloud threats. He emphasizes that organizations must shift their approach to data security, acknowledging the complexities introduced by mobile access to

React to this headline:

Loading spinner

Security and privacy strategies for CISOs in a mobile-first world Read More »

Cloud migration expands the CISO role yet again

Cloud migration expands the CISO role yet again 2024-06-11 at 07:31 By Help Net Security The CISO role used to be focused primarily on information security — creating and implementing policies to safeguard an organization’s data and IT infrastructure from cybersecurity threats. However, as organizations rapidly migrate to cloud environments, the responsibilities and challenges for

React to this headline:

Loading spinner

Cloud migration expands the CISO role yet again Read More »

Microsoft pours $2.2B into Malaysia for cloud, AI expansion

Microsoft pours $2.2B into Malaysia for cloud, AI expansion 2024-05-02 at 13:01 By Cointelegraph by Amaka Nwaokocha In a statement, Microsoft said it will collaborate with the Malaysian government to establish a “national AI Center of Excellence” and improve cybersecurity capabilities. This article is an excerpt from Cointelegraph.com News View Original Source React to this

React to this headline:

Loading spinner

Microsoft pours $2.2B into Malaysia for cloud, AI expansion Read More »

Why cloud vulnerabilities need CVEs

Why cloud vulnerabilities need CVEs 2024-05-01 at 08:01 By Help Net Security When considering vulnerability management’s purpose in a modern world, it’s imperative to recognize the huge transition to new technologies and how you manage risk within these different paradigms and environments (e.g., the cloud). Patch network security isn’t applicable in the same way for

React to this headline:

Loading spinner

Why cloud vulnerabilities need CVEs Read More »

Cloud Users Warned of Data Exposure Risk From Command-Line Tools

Cloud Users Warned of Data Exposure Risk From Command-Line Tools 2024-04-16 at 18:01 By Eduard Kovacs Cloud security specialists found data exposure risk associated with Azure, AWS, and Google Cloud command-line tools. The post Cloud Users Warned of Data Exposure Risk From Command-Line Tools appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Cloud Users Warned of Data Exposure Risk From Command-Line Tools Read More »

Strategies to cultivate collaboration between NetOps and SecOps

Strategies to cultivate collaboration between NetOps and SecOps 2024-04-12 at 07:31 By Mirko Zorz In this Help Net Security interview, Debby Briggs, CISO at Netscout, discusses breaking down silos between NetOps and SecOps. Practical steps include scheduling strategy meetings, understanding communication preferences, and fostering team collaboration. With evolving cloud models, collaboration and clear role assignments

React to this headline:

Loading spinner

Strategies to cultivate collaboration between NetOps and SecOps Read More »

37% of publicly shared files expose personal information

37% of publicly shared files expose personal information 2024-04-11 at 06:31 By Help Net Security Many sensitive documents stored on platforms such as Google Drive, Slack, and other collaborative work applications have been left unattended for several months or even years. This has led to data sprawl challenges for companies and significant data security threats

React to this headline:

Loading spinner

37% of publicly shared files expose personal information Read More »

Confidential VMs Hacked via New Ahoi Attacks

Confidential VMs Hacked via New Ahoi Attacks 2024-04-08 at 17:01 By Eduard Kovacs New Ahoi attacks Heckler and WeSee target AMD SEV-SNP and Intel TDX with malicious interrupts to hack confidential VMs. The post Confidential VMs Hacked via New Ahoi Attacks appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View

React to this headline:

Loading spinner

Confidential VMs Hacked via New Ahoi Attacks Read More »

Essential elements of a strong data protection strategy

Essential elements of a strong data protection strategy 2024-03-27 at 07:01 By Mirko Zorz In this Help Net Security interview, Matt Waxman, SVP and GM for data protection at Veritas Technologies, discusses the components of a robust data protection strategy, emphasizing the escalating threat of ransomware. He highlights the importance of backup and recovery protocols

React to this headline:

Loading spinner

Essential elements of a strong data protection strategy Read More »

Webinar Today: How to Reduce Cloud Identity Risk

Webinar Today: How to Reduce Cloud Identity Risk 2024-03-26 at 18:46 By SecurityWeek News Please the fireside chat as Phil Bues, Cloud Research Manager at IDC, discusses the challenges and best practices for cybersecurity leaders managing cloud identities. The post Webinar Today: How to Reduce Cloud Identity Risk appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Webinar Today: How to Reduce Cloud Identity Risk Read More »

Using cloud development environments to secure source code

Using cloud development environments to secure source code 2024-03-21 at 07:01 By Help Net Security In this Help Net Security video, Rob Whiteley, CEO at Coder, discusses the cloud development environment (CDE) technology landscape and its benefits. From the earliest stages of writing code to deploying finalized applications, CDEs are reimagining the developer experience, gaining

React to this headline:

Loading spinner

Using cloud development environments to secure source code Read More »

Scroll to Top