Cloud Security - Security Boulevard https://securityboulevard.com/category/blogs/cloud-security/ The Home of the Security Bloggers Network Fri, 30 Aug 2024 10:44:51 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.1 https://securityboulevard.com/wp-content/uploads/2021/10/android-chrome-256x256-1-32x32.png Cloud Security - Security Boulevard https://securityboulevard.com/category/blogs/cloud-security/ 32 32 133346385 Veeam Widens Beam to MongoDB, Nutanix & Proxmox VE https://securityboulevard.com/2024/08/veeam-widens-beam-to-mongodb-nutanix-proxmox-ve/ Fri, 30 Aug 2024 10:44:51 +0000 https://securityboulevard.com/?p=2029255 Veeam, recovery, sensitive, data, cyber resilience, ransomware loanDepot financial services

Veeam has shown evidence of its capabilities to provide backup, recovery and cybersecurity across an increasing number of heavyweight cloud platforms, databases and service layers including MongoDB and Nutanix.

The post Veeam Widens Beam to MongoDB, Nutanix & Proxmox VE appeared first on Security Boulevard.

]]>
2029255
Navigating Cloud Security: Q&A on the Importance of Collaboration and Innovation https://securityboulevard.com/2024/08/navigating-cloud-security-qa-on-the-importance-of-collaboration-and-innovation/ https://securityboulevard.com/2024/08/navigating-cloud-security-qa-on-the-importance-of-collaboration-and-innovation/#respond Thu, 29 Aug 2024 13:00:00 +0000 https://www.guidepointsecurity.com/?p=33652 In an increasingly complex landscape dominated by cloud technology, understanding the intricacies of cloud security is more vital than ever. […]

The post Navigating Cloud Security: Q&A on the Importance of Collaboration and Innovation appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/08/navigating-cloud-security-qa-on-the-importance-of-collaboration-and-innovation/feed/ 0 2029320
China Cyberwar Coming? Versa’s Vice: Volt Typhoon’s Target https://securityboulevard.com/2024/08/china-cyberwar-coming-versas-vice-volt-typhoons-target/ Wed, 28 Aug 2024 16:57:30 +0000 https://securityboulevard.com/?p=2029126 A Chinese flag flies on a high pole

Xi whiz: Versa Networks criticized for swerving the blame.

The post China Cyberwar Coming? Versa’s Vice: Volt Typhoon’s Target appeared first on Security Boulevard.

]]>
2029126
How Displays2go Increased Conversions & Reduced Costs with DataDome https://securityboulevard.com/2024/08/how-displays2go-increased-conversions-reduced-costs-with-datadome/ https://securityboulevard.com/2024/08/how-displays2go-increased-conversions-reduced-costs-with-datadome/#respond Wed, 28 Aug 2024 07:00:58 +0000 https://datadome.co/?p=100240 By partnering with DataDome, Displays2go successfully eradicated bots and scraping, ensuring accurate data and reducing unnecessary expenses.

The post How Displays2go Increased Conversions & Reduced Costs with DataDome appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/08/how-displays2go-increased-conversions-reduced-costs-with-datadome/feed/ 0 2029173
‘Terrorgram’ Telegram Terrorists Trash Transformers — Grid in Peril https://securityboulevard.com/2024/08/telegram-terrorgram-grid-richixbw/ Tue, 27 Aug 2024 17:19:11 +0000 https://securityboulevard.com/?p=2028965 Sign reads, “Danger: High Voltage!”

Should’ve listened to Edison: After the arrest of Pavel Durov—the Telegram CEO—comes news of domestic extremists using the chat app to organize.

The post ‘Terrorgram’ Telegram Terrorists Trash Transformers — Grid in Peril appeared first on Security Boulevard.

]]>
2028965
One-Third Of Companies Suffered SaaS Breach This Year https://securityboulevard.com/2024/08/one-third-of-companies-suffered-saas-breach-this-year/ Tue, 27 Aug 2024 17:04:16 +0000 https://securityboulevard.com/?p=2028602 vulnerable, vulnerabilities, web app attacks, SaaS, SaaS app security, cybersecurity SaaS extension

SaaS breaches are on the rise, and nearly half the corporate victims have more than 2,500 employees. Those are among the sobering conclusions from a survey of security experts at 644 organizations in six countries — the U.S., UK, France, Germany, Japan and Australia — by AppOmni, which found a third of organizations suffered a SaaS data..

The post One-Third Of Companies Suffered SaaS Breach This Year appeared first on Security Boulevard.

]]>
2028602
Miggo Uncovers AWS Load Balancer Security Flaw https://securityboulevard.com/2024/08/miggio-uncovers-aws-load-balancer-security-flaw/ Mon, 26 Aug 2024 11:08:57 +0000 https://securityboulevard.com/?p=2028829 AWS, APIs Cyera AWS logs Druva vulnerabilities eBay cyberstalking

Miggio has discovered a configuration-based vulnerability that enables cybercriminals to bypass authentication and authorization services provided by the Application Load Balancer (ALB) from Amazon Web Services (AWS) that could affect more than 15,000 potentially vulnerable applications.

The post Miggo Uncovers AWS Load Balancer Security Flaw appeared first on Security Boulevard.

]]>
2028829
The Great Cloud Security Debate: CSP vs. Third-Party Security Tools https://securityboulevard.com/2024/08/the-great-cloud-security-debate-csp-vs-third-party-security-tools/ https://securityboulevard.com/2024/08/the-great-cloud-security-debate-csp-vs-third-party-security-tools/#respond Wed, 21 Aug 2024 22:17:33 +0000 https://medium.com/p/6563e3dc6ac9 Do I go to my Cloud Service Provider (CSP) for cloud security tooling or to a third party vendor?

Who will secure my cloud use, a CSP or a focused specialty vendor?

Who is my primary cloud security tools provider?

This question asked in many ways has haunted me since my analyst days, and I’ve been itching for a good, fiery debate on this. So, we did this on our Cloud Security Podcast by Google where the co-hosts divided the positions, researched the arguments in advance of the debate and then just … WENT AT EACH OTHER :-)

The results were so fun and interesting that this blog was born!

The Case for Third-Party Vendor Tooling

These arguments hinge on three primary concerns: trust, consistency, and innovation.

Some observers also highlight the theoretical conflict of interest when a CSP is responsible for both building and securing the cloud (no idea why people say this, as IMHO there is no conflict here). This side also stressed the importance of consistency across multi-cloud environments and argued that dedicated security vendors are more likely to innovate more rapidly. They also may address client needs faster, especially narrow vertical needs.

  • You just can’t trust the cloud builder to secure their own stuff (or “letting the cat guard the cream” as somebody weirdly opined on social media). Third-party vendors promise unbiased security analysis and can uncover security issues that CSPs might deprioritize, benefiting the broader public and individual users. This separation of duties suggests a more objective evaluation of cloud security.
  • Consistency is super critical for multicloud. Third-party tools provide a consistent security framework across multiple cloud platforms. This simplifies management and reduces the need for specialized knowledge in each CSP’s unique security offerings.
  • Startups just build better tools; this is their focus and sole mission; CSPs suffer from “security from a big company” syndrome, being slow and political. Third-party vendors, whose core business is security, are more likely to develop innovative and effective security solutions compared to CSPs, who may view security as a secondary concern.
  • Auxiliary argument: Would you ever trust the CSP to secure the network/environment that belongs to their competitor?

The Case for CSP-Native

These arguments hinged on three primary concerns: deep platform knowledge, built-in security, and seamless stack.

Deep platform knowledge that CSPs possess suggests both robust and “automatic”, default security. The seamlessness of CSP-native tools and the vast (we mean it, BTW!) resources that CSPs dedicate to security also play a key role. CSPs are very well positioned to keep pace with the rapid evolution of cloud services, and secure them as they are built.

  • CSP knows the platform and cloud in general best, can use unlisted or poorly documented capabilities to secure the cloud. Security deeply integrated into the platform is “more secure”, and also better linked with asset tracking, and other IT ops / DevOps capabilities. This deep knowledge translates into superior security capabilities, both practical and conceptual.
  • Built-in beats bolt-on, with fewer seams to break and break through. CSP-native tools offer seamless integration with other services, streamlining workflows, and reducing the risk of security gaps that can arise from stitching together disparate tools. This results in a simpler and more manageable security stack. Recent breaches highlight the risks associated with these integration points, underscoring the advantage of built-in security.
  • Using native tools reduces the number of third-party vendors and solutions you need to manage, leading to a simpler security stack and less administrative overhead. When cloud platforms and security tools share the same foundation, operational teams benefit from streamlined access and workflows.
  • Auxiliary argument: CSP keeps pace with securing new services as they are being launched. And there are a lot of cloud services being launched.

The Verdict

  • “It depends” wins! It really does. No, we are not hedging or fudging. Are you disappointed?
  • To make it practical, we need to answer “depends on what?” Organizational realities: how you use cloud, what cloud, how many clouds, what is your threat model, etc.
  • None of the arguments from either side include a “killer” or a clincher argument that stops the debate and hands the victory to one side.
  • Often starting with CSP-native tools and then supplementing with third-party solutions to address any gaps (if any) is the way to go (this also was Gartner advice in my days, BTW)

Listen to the audio version (better jokes!). And, yes, do read “Snow Crash” if you somehow failed to, before.

Resources:


The Great Cloud Security Debate: CSP vs. Third-Party Security Tools was originally published in Anton on Security on Medium, where people are continuing the conversation by highlighting and responding to this story.

The post The Great Cloud Security Debate: CSP vs. Third-Party Security Tools appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/08/the-great-cloud-security-debate-csp-vs-third-party-security-tools/feed/ 0 2028532
Mastering Cloud Security: Uncovering Hidden Vulnerabilities with NodeZero™ https://securityboulevard.com/2024/08/mastering-cloud-security-uncovering-hidden-vulnerabilities-with-nodezero/ https://securityboulevard.com/2024/08/mastering-cloud-security-uncovering-hidden-vulnerabilities-with-nodezero/#respond Wed, 21 Aug 2024 20:15:46 +0000 https://www.horizon3.ai/?p=261769 Master cloud security with NodeZero™ Cloud Pentesting. Easily uncover vulnerabilities across AWS and Azure, prioritize identity risks, and secure your environment in just minutes. Stay ahead of threats.

The post Mastering Cloud Security: Uncovering Hidden Vulnerabilities with NodeZero™ appeared first on Horizon3.ai.

The post Mastering Cloud Security: Uncovering Hidden Vulnerabilities with NodeZero™ appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/08/mastering-cloud-security-uncovering-hidden-vulnerabilities-with-nodezero/feed/ 0 2028543
How to Patch your Linux Kernel before it gets exploited? https://securityboulevard.com/2024/08/how-to-patch-your-linux-kernel-before-it-gets-exploited/ https://securityboulevard.com/2024/08/how-to-patch-your-linux-kernel-before-it-gets-exploited/#respond Tue, 20 Aug 2024 06:00:22 +0000 https://kratikal.com/blog/?p=11054 Linux Kernel server patch management is essential for ensuring the security, stability, and performance of your server infrastructure. This comprehensive guide covers everything you need to know, from the basics to advanced strategies for managing patches on Linux servers. Whether you’re an experienced system administrator or just starting out, this guide will provide you with […]

The post How to Patch your Linux Kernel before it gets exploited? appeared first on Kratikal Blogs.

The post How to Patch your Linux Kernel before it gets exploited? appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/08/how-to-patch-your-linux-kernel-before-it-gets-exploited/feed/ 0 2028250