November 6, 2023
Via: CIOThe business world is rapidly continuing its digital transformation and relying on cloud-based solutions. This makes it more critical than ever to adopt strong security measures to protect sensitive information and infrastructure. However, while cloud computing offers benefits like improved […]
October 30, 2023
Via: CSO OnlineAfter companies move to the cloud, many are under the impression that their cloud hosting providers are solely responsible for security, a misconception that can lead to data breaches and other security issues. While the responsibility for securing cloud infrastructure […]
October 30, 2023
Via: TechRadarThere had been “thousands” of hyper-volumetric HTTP distributed denial of service (DDoS) attacks in the time since the HTTP/2 Rapid Reset vulnerability was disclosed, a new report from Cloudflare has claimed, adding that 89 of those exceeded 100 million requests […]
October 23, 2023
Via: TechRadarCybersecurity researchers from Kaspersky have uncovered a sophisticated new piece of malware called TetrisPhantom seen compromising secure USB drives to steal sensitive information from government endpoints in the Asia-Pacific region. Secure USB drives have an encrypted partition whose files can […]
October 19, 2023
Via: CSO OnlineIn 2019, I founded and served as the CEO of a cloud security company (C3M), a journey that eventually led to our acquisition by CyberArk in 2022. Back then, the cloud security scene was budding, filled with migration buzz and […]
October 18, 2023
Via: CSO OnlineWith cyberattacks continually rising, cyber criminals will take advantage of current events or previous breaches and claim they have infiltrated a business when they have not. Organizations should plan for false breach claims and must be ready to follow the […]
October 18, 2023
Via: CSO OnlineThe percentage of organizations worldwide that have implemented a zero-trust initiative has almost tripled in the past three years going from 24% in 2021 to 61% in 2023, according to data from Okta’s 2023 State of Zero Trust report. Companies […]
October 10, 2023
Via: TechRadarLooking to put your bug hunting skills to good use and earn yourself a pretty penny in the process? Google has launched its latest bounty challenge rewarding participants for discovering bugs and exploiting vulnerabilities in Chrome’s v8 JavaScript and Google […]
October 10, 2023
Via: ZDnetDistributed Denial of Service (DDoS) attacks may be one of the least sophisticated types of cyberattacks but they can do real damage. Now Google and other top cloud companies are reporting new records for the largest DDoS attacks ever. The […]
September 27, 2023
Via: CSO OnlineCloud security vendor Sysdig has added a new attack graph to its cloud-native application protection platform (CNAPP). The graph provides real-time cloud attack path analysis and live risk prioritization across assets, users, and activity, according to the firm. Sysdig has […]
September 22, 2023
Via: Cloud TweaksCybersecurity is an ever-expanding discipline, where every move is crucial, and the risks are unparalleled. Businesses must adapt to evolving threats, and this article provides an in-depth look into the key areas of concern, offering strategic insights specifically for enterprises. […]
September 19, 2023
Via: Cloud TweaksIn today’s rapidly evolving digital landscape, the concept of endpoint has significantly extended beyond traditional workstations and servers to include a plethora of cloud resources. From API interfaces to virtual machines and databases, these cloud endpoints are integral to modern […]
September 18, 2023
Via: TechRadarOf all the vulnerabilities an organization’s system has, the majority sit within its cloud environment, a new report from cybersecurity researchers Unit 42, part of Palo Alto Networks, has found. As per the report, four in five (80%) of all […]
September 15, 2023
Via: Network WorldAs connectivity to cloud-based resources grows, cybercriminals are using valid, compromised credentials to access enterprise resources at an alarming rate. That’s one of the chief findings of the IBM X-Force Cloud Threat Landscape Report, which also found a 200% increase […]
September 12, 2023
Via: Network WorldCisco is adding a security module to its observability platform that promises to help enterprises assess threat risks and protect cloud-based resources. The Cisco Secure Application module, available now, is part of the vendor’s Full Stack Observability (FSO) platform, which […]
August 28, 2023
Via: CSO OnlineLaws and standards around cybersecurity are plenty and to make matters worse they often vary within countries. When CISOs need to focus on cybersecurity across the borders of a country, international agreements and frameworks can bring some guidance on meeting […]
August 23, 2023
Via: CSO OnlineThe cloud computing skies have been somewhat stormy of late for Microsoft, which has found itself in the crosshairs of not only an attacker who abused authentication but also the firm Tenable, which pointed out that the cloud services giant […]
August 23, 2023
Via: CSO OnlineContainerized applications bring many benefits — they are a fast way to deploy software across multiple computing environments. But securing containers is a challenge, since their unique attributes, particularly their ephemeral nature, means that they have been treated differently by […]
August 21, 2023
Via: TechRadarA known ransomware gang is exploiting a high-severity vulnerability in enterprise backup solutions to deploy malware to their targets and steal login credentials. This is according to a new report from BlackBerry’s Threat Research and Intelligence team, which claims that […]
August 18, 2023
Via: InfoWorldThe 2023 Cloud Security Report, sponsored by Fortinet, surveyed 752 cybersecurity professionals from around the globe and across all industries. Most respondents (90%) say having a single cloud security platform to configure and manage security consistently across their cloud deployments […]