Top

Tag: cyberattacks


Cloud Security

Report: Cloud Infrastructure More Susceptible to Cyberattacks, Say CISOs

September 15, 2022

Via: Data Center Knowledge

Your CISO may be giving you a call to send budget for cloud infrastructure security your way. Here’s why: When asked how vulnerable their organizations are to impending cyberattacks, 66% of the surveyed CISOs said their organizations remain vulnerable to […]


Cloud Security

10 industry-defining security incidents from the last decade

July 19, 2022

Via: CSO Online

The last decade has seen its fair share of watershed moments that have had major implications on the cybersecurity landscape. Severe vulnerabilities, mass exploitations, and widespread cyberattacks have reshaped many aspects of modern security. To take stock of the past […]


Cloud Security

Convergence Ahoy: Get Ready for Cloud-Based Ransomware

December 17, 2021

Via: Threat Post

The two types of cyberattacks that have dominated the news over the past year have been ransomware, and software and service supply-chain attacks. The former have mainly been perpetrated by criminal enterprises looking to turn a quick profit. In contrast, […]


Cloud Security

How Biden’s Cloud Security Executive Order Stacks Up to Industry Expectations

August 20, 2021

Via: www.securityintelligence.com

While we’re seeing the effects of larger, more expensive cyberattacks, those effects also ripple out into government policy. The growth of cloud security needs and products reflects the wider world in two major ways: the rise of remote work and […]


Cloud Security

Google Cloud Pitches Security Tools to Aid Government Business

July 21, 2021

Via: Data Center Knowledge

Google Cloud unveiled three security products for governments to expand its public-sector business and shore up systems that are increasingly vulnerable to cyberattacks. Google’s new software offerings are based on a zero-trust framework and will help governments be in compliance […]


Cloud Security

Kubernetes Cloud Clusters Face Cyberattacks via Argo Workflows

July 21, 2021

Via: Threat Post

Kubernetes clusters are being attacked via misconfigured Argo Workflows instances, security researchers are warning. Argo Workflows is an open-source, container-native workflow engine for orchestrating parallel jobs on Kubernetes – to speed up processing time for compute-intensive jobs like machine learning […]


Cloud Security

You could be hacked and not know it

March 30, 2021

Via: InfoWorld Cloud Computing

You have to respect that ransomware attacks let you know you’ve been attacked. You’ll have an opportunity to defend yourself and batten down the hatches. However, a rising tide of cyberattacks is much more sneaky about things. Called “stealth hacking,” […]


Cloud Security

The cloud attack you didn’t see coming

March 30, 2021

Via: InfoWorld Cloud Computing

You have to respect that ransomware attacks at least let you know you’ve been attacked. You’ll have an opportunity to defend yourself and batten down the hatches. However, a rising tide of cyberattacks is much more sneaky about things. Called […]


Global Cloud

How to avoid subdomain takeover in Azure environments

December 23, 2020

Via: CSO Online

Have you set up a domain and pointed to a cloud resource and then deleted the site? Have you left behind the CNAME in your domain name services settings? Many admins have, and attackers know it. These lapses allow attackers […]


Global Cloud

Lack of cloud expertise, controls leave APAC firms vulnerable in remote work

September 9, 2020

Via: ZDnet

The global pandemic has sent 92% of organisations scurrying to adopt new technologies in order to facilitate remote work, but businesses in Asia-Pacific often come up short on cloud expertise and endpoint controls. Such common oversights can leave these companies […]


Deployment Models, Hybrid Cloud

Stick the Landing: 6 Steps to Broaden Your Cyber Resilience Web

May 12, 2020

Via: Security Intelligence

Cyber resilience emerged as a response to the evolving need for information security. Organizations recognized that attacks were a question of when, not if, and adapted security strategy to include orchestrated response and recovery frameworks that could identify critical assets, […]


Global Cloud

How WAF-as-a-Service Addresses Critical Customer Vulnerabilities

August 20, 2018

Via: Talkin' Cloud

For MSPs that want to extend their security footprint within their client base, providing web application firewall (WAF) services offers a way to increase revenues while reducing data breaches for customers. Just how big is the web application security problem? […]


Global Cloud

IAmI prevents cyberattacks in real time with IBM Cloud

March 29, 2018

Via: Thoughts on Cloud

With ever-advancing cyberattacks, hackers are gaining unauthorized access to networks and secure data at alarmingly high and unprecedented rates. Many organizations don’t even know their network security has been compromised until it’s much too late. Once stolen, their private data […]