June 6, 2023
Via: Computer WeeklyLate in 2022, an update of the Dutch Corporate Governance Code was released to include a section on governance of IT. The code prescribes rules of conduct for directors of listed companies to protect the interests of shareholders, employees and […]
Cloud Security, Service Models
June 5, 2023
Via: CSO OnlineAI-based cyber risk management SaaS vendor SAFE Security has announced the release Cyber Risk Cloud of Cloud – a new offering it claims uses generative AI to help businesses predict and prevent cyber breaches. It does so by answering questions […]
June 1, 2023
Via: Data Center KnowledgeA fundamental decision for cloud security architects is how much to rely on the cloud-native security tools of their cloud provider, be it AWS, GCP, Azure, or any other provider. “As much as possible” is the wish of cloud engineers, […]
May 31, 2023
Via: CSO OnlineImproperly deactivated and unmaintained Salesforce sites are vulnerable to threat actors who can gain access to sensitive business data and personally identifiable information (PII) by simply changing the host header. That’s according to new research from Varonis Threat Labs, which […]
May 30, 2023
Via: CSO OnlineHybrid and multicloud adoption are par for the course for enterprise businesses, with 86% of organizations planning to increase their investment in the technology. And while cloud technology does bring inherent advantages—namely flexibility, cost-effectiveness, improved disaster recovery, increased security, better […]
May 23, 2023
Via: TechRadarA total of 41.6 million breached accounts were detected in the first quarter of 2023, which may sound like a huge figure, but is actually a significant drop, a new global report from cybersecurity experts Surfshark states. The figure represents […]
May 22, 2023
Via: CSO OnlineCybersecurity can be a thankless battle at times, demanding constant vigilance to thwart malicious attacks. But while bad news tends to grab headlines, we do see cybersecurity success stories emerging. Every day, our defenders quietly share information that helps raise […]
May 19, 2023
Via: CIO DiveRansomware attacks are notoriously underreported and cyber authorities acknowledge this incomplete data on ransomware activity creates a blind spot that hampers recovery, response efforts and the prevention of future attacks. U.S. officials and cybersecurity experts say greater transparency is needed […]
May 17, 2023
Via: CSO OnlineFinancially motivated threat actor UNC3944 is using phishing and SIM swapping attacks to take over Microsoft Azure admin accounts and gain access to virtual machines (VM), according to cybersecurity firm Mandiant. Using access to virtual machines the attackers employed malicious […]
May 16, 2023
Via: CSO OnlineCloud native security vendor Aqua Security has announced the launch of Real-Time CSPM, a new cloud security posture management solution designed to provide visibility and risk prioritization across multi-cloud security risks. Real-Time CSPM uses “real-time scanning” to pinpoint threats that […]
May 11, 2023
Via: TechRadarRansomware operators are getting better at encrypting data during attacks, causing extra headaches for the IT teams trying to parry the attack, a new report has claimed. The Sophos state of ransomware(opens in new tab) 2023 report, based on a […]
May 9, 2023
Via: Data Center KnowledgeEnsuring your organization follows best practices to hold hackers at bay and knowing you are not accountable if things go really, really wrong are two powerful reasons why managers implement security standards. But which standard matters when architecting your cloud […]
May 5, 2023
Via: CSO OnlineAgentless cloud security provider Orca Security has integrated Microsoft Azure OpenAI GPT-4 into its cloud-native application protection platform (CNAPP) under the ChatGPT implementation program that the cybersecurity company started earlier this year. “With our transition to Azure OpenAI, our customers […]
May 4, 2023
Via: TechRadarCloud-based security threats are growing at a faster rate than ever, as threat actors find new and innovative ways to push malware(opens in new tab) through the novel technology. Netskope’s latest Cloud & Threat Report: Global Cloud and Web Malware […]
May 4, 2023
Via: CIOIn the first use case of this series, Stay in Control of Your Data with a Secure and Compliant Sovereign Cloud, we looked at what data sovereignty is, why it’s important, and how sovereign clouds solve for jurisdictional control issues. […]
May 3, 2023
Via: Network WorldAmazon Web Services has launched a service that secures user access to its cloud applications without requiring a VPN. AWS Verified Access, which the company previewed last November, validates every application request using Zero Trust principles before granting access to […]
April 28, 2023
Via: CIOThe IT industry has recently seen some interesting activity from global hyperscale cloud providers surrounding their cloud sovereignty ambitions, and their scrutiny by the regulators covering some basics compliance requirements, like the European Union’s (EU) General Data Protection Regulation (GDPR). […]
April 28, 2023
Via: CIOStaying in control and securing your data has never been more important. As data privacy regulations continue to evolve, businesses have had to adapt how and where they store data. The EU’s General Data Protection Regulation (GDPR) has been the […]
April 25, 2023
Via: TechRadarAmazon Web Services (AWS) GuardDuty, the company’s threat detection service in the cloud(opens in new tab), is getting three new features that should further strengthen customer security. In a press release, the cloud giant said that EKS Runtime Monitoring, GuardDuty […]
April 18, 2023
Via: Computer WeeklyUsers of cloud computing resources have a tendency to make the same mistakes repeatedly, with the vast majority – approximately 80% – of alerts seen by security teams triggered by a scant 5% of security rules, according to findings set […]