Cloud Security
Navigating Cloud Security: Q&A on the Importance of Collaboration and Innovation
In an increasingly complex landscape dominated by cloud technology, understanding the intricacies of cloud security is more vital than ever. […] ...
Miggo Uncovers AWS Load Balancer Security Flaw
Miggio has discovered a configuration-based vulnerability that enables cybercriminals to bypass authentication and authorization services provided by the Application Load Balancer (ALB) from Amazon Web Services (AWS) that could affect more than ...
The Great Cloud Security Debate: CSP vs. Third-Party Security Tools
Do I go to my Cloud Service Provider (CSP) for cloud security tooling or to a third party vendor?Who will secure my cloud use, a CSP or a focused specialty vendor?Who is my ...
How to Patch your Linux Kernel before it gets exploited?
Linux Kernel server patch management is essential for ensuring the security, stability, and performance of your server infrastructure. This comprehensive guide covers everything you need to know, from the basics to advanced ...
Extortion Group Exploits Cloud Misconfigurations, Targets 110,000 Domains
An unknown threat group leveraged publicly exposed environment variables in organizations' AWS accounts to exfiltrate sensitive data and demand ransoms in a wide-ranging extortion campaign that targeted 110,000 domains ...
Mandatory MFA is Coming to Microsoft Azure
Microsoft is making MFA mandatory for signing into Azure accounts, the latest step in the IT vendor's Secure Future Initiative that it expanded in May in the wake of two embarrassing breaches ...
Beyond Zero-Trust: The Impact of Adaptive Micro-Segmentation on Network Security
Security is enhanced with the introduction of dynamic zero-trust security, a method that continuously assesses the security posture of devices and users on the network ...
Humans are Top Factor in Cloud Security: CSA Study
A study by the CSA found that the human element continues to play a key role in the top threats facing cloud computing environments, including misconfigurations, IAM, and insecurity interfaces and APIs ...
How to Implement Data-Centric Security in Google Cloud and BigQuery
AI, analytics and cloud-based data stores are driving a revolution in data-driven decision making. Yet as more organizations adopt these technologies to carve out competitive advantage, they realize that the underlying data ...
Sysdig Adds Ability to Correlate Identities to Cloud Computing Breaches
Sysdig today extended the reach of the cloud detection and response platform by adding the ability to correlate identity behavior with workload activity and cloud resources. Maya Levine, a product manager for ...