January 19, 2023
Via: TechRadarCloud-based cyberattacks have increased by almost half (48%) over the course of 2022 compared to the previous year, new figures from Check Point Research (CPR) have shown. The company’s analysis determined that as businesses accelerate their digital transformation efforts, they’re […]
September 15, 2022
Via: Data Center KnowledgeYour CISO may be giving you a call to send budget for cloud infrastructure security your way. Here’s why: When asked how vulnerable their organizations are to impending cyberattacks, 66% of the surveyed CISOs said their organizations remain vulnerable to […]
July 19, 2022
Via: CSO OnlineThe last decade has seen its fair share of watershed moments that have had major implications on the cybersecurity landscape. Severe vulnerabilities, mass exploitations, and widespread cyberattacks have reshaped many aspects of modern security. To take stock of the past […]
December 17, 2021
Via: Threat PostThe two types of cyberattacks that have dominated the news over the past year have been ransomware, and software and service supply-chain attacks. The former have mainly been perpetrated by criminal enterprises looking to turn a quick profit. In contrast, […]
August 20, 2021
Via: www.securityintelligence.comWhile we’re seeing the effects of larger, more expensive cyberattacks, those effects also ripple out into government policy. The growth of cloud security needs and products reflects the wider world in two major ways: the rise of remote work and […]
July 21, 2021
Via: Data Center KnowledgeGoogle Cloud unveiled three security products for governments to expand its public-sector business and shore up systems that are increasingly vulnerable to cyberattacks. Google’s new software offerings are based on a zero-trust framework and will help governments be in compliance […]
July 21, 2021
Via: Threat PostKubernetes clusters are being attacked via misconfigured Argo Workflows instances, security researchers are warning. Argo Workflows is an open-source, container-native workflow engine for orchestrating parallel jobs on Kubernetes – to speed up processing time for compute-intensive jobs like machine learning […]
March 30, 2021
Via: InfoWorld Cloud ComputingYou have to respect that ransomware attacks let you know you’ve been attacked. You’ll have an opportunity to defend yourself and batten down the hatches. However, a rising tide of cyberattacks is much more sneaky about things. Called “stealth hacking,” […]
March 30, 2021
Via: InfoWorld Cloud ComputingYou have to respect that ransomware attacks at least let you know you’ve been attacked. You’ll have an opportunity to defend yourself and batten down the hatches. However, a rising tide of cyberattacks is much more sneaky about things. Called […]
December 23, 2020
Via: CSO OnlineHave you set up a domain and pointed to a cloud resource and then deleted the site? Have you left behind the CNAME in your domain name services settings? Many admins have, and attackers know it. These lapses allow attackers […]
September 9, 2020
Via: ZDnetThe global pandemic has sent 92% of organisations scurrying to adopt new technologies in order to facilitate remote work, but businesses in Asia-Pacific often come up short on cloud expertise and endpoint controls. Such common oversights can leave these companies […]
Deployment Models, Hybrid Cloud
May 12, 2020
Via: Security IntelligenceCyber resilience emerged as a response to the evolving need for information security. Organizations recognized that attacks were a question of when, not if, and adapted security strategy to include orchestrated response and recovery frameworks that could identify critical assets, […]
August 20, 2018
Via: Talkin' CloudFor MSPs that want to extend their security footprint within their client base, providing web application firewall (WAF) services offers a way to increase revenues while reducing data breaches for customers. Just how big is the web application security problem? […]
March 29, 2018
Via: Thoughts on CloudWith ever-advancing cyberattacks, hackers are gaining unauthorized access to networks and secure data at alarmingly high and unprecedented rates. Many organizations don’t even know their network security has been compromised until it’s much too late. Once stolen, their private data […]