The increase in cyberattacks—and the increase in the cost of cyberattacks—sends a clear signal: Something about the cybersecurity industry needs to change. We live in a world where malicious cyberattack campaigns are persistent and relentless. Even as…
Tag: Cloud Security
Global Security News, Vulnerabilities
Oak9 Lands $8 Million in New Venture Investment
by SecurityWeek News •
Chicago-based Infrastructure-as-Code (IaC) startup oak9 has attracted new interest from venture capitalists with Cisco Investments and Morgan Stanley’s Next Level Fund joining a new $8 million funding round.
read more
Global Security News, Vulnerabilities
North Korea Lazarus Hackers Blamed for $100 Million Horizon Bridge Heist
by Ryan Naraine •
The infamous North Korean Lazarus hacking group is the prime suspect in the $100 million hack of Harmony’s Horizon Bridge, according to new data and research from blockchain analytics firm Elliptic.
read more
Europe, Global Security News, North America
High Availability and Security for Cloud-Based Systems
by Dave Bermingham •
IT organizations striving to ensure compliance with HIPAA, Sarbanes-Oxley, BASEL II and similar regulations generally have a good grasp of the security considerations that apply to key hardware and software systems running in the cloud. They need to m…
North America
Is 2022 the Year of Secure Access Service Edge?
by Jonathan Reed •
In 2022, nearly 60% of U.S. workers (whose work can be done remotely) work from home all or most of the time. Remote work coupled with the explosion of apps, APIs, devices and Internet of Things (IoT) shows us no organization can afford to think about the perimeter in yesterday’s terms anymore. SASE (Secure Access […]
The post Is 2022 the Year of Secure Access Service Edge? appeared first on Security Intelligence.
Europe, Global Security News, North America
10 Major Database Security Threats and How to Prevent Them
by Guest Author •
Data is a crucial asset of your company. Companies gather a lot of data daily from their customers and daily operations. The data stored in databases are then utilized to handle and automate different functions within and outside companies. Because of …
Europe, Global Security News, North America
Benefits of Infrastructure-as-a-Service
by Kelsey Kinzer •
Learn about the top benefits of IaaS and how a cloud directory can help streamline and augment security in IaaS environments.
The post Benefits of Infrastructure-as-a-Service appeared first on JumpCloud.
The post Benefits of Infrastructure-as-a-Service…
Europe, Global Security News, North America
Adopting a Multifaceted Security Approach
by John Moschella •
Over the past decade, terms like malware and ransomware have increasingly entered into the public vernacular, especially as they relate to highly publicized, high-profile cybersecurity attacks. Most recently, the Biden administration issued a dire war…
Europe, Global Security News, North America
DE:CODED – Firewall speeds and VPN risks
by SE Labs Team •
“If they are not getting any money from you, then where are they getting the money from?” Show notes for series 2, episode 2 Is your firewall as fast as you think? What does XDR mean and how does it work? Do you need a personal VPN? We talk to Brian Mo…
Security Bloggers, Security Vendor News
The Role of IAM in Maintaining Cloud Security
by Tripwire Guest Authors •
Cloud computing is an effective solution for large and small companies across every industry. There has been rapid adoption due in large part to its accessibility, flexibility, and reliability. The cloud environment brings a significant amount of benef…
Global Security News, Vulnerabilities
Normalyze Announces $22 Million for DSPM Technology
by Ryan Naraine •
Bay Area startup Normalyze on Monday announced a $22 million in Series A funding as venture capital investors rush to place bets on the newly coined Data Security Posture Management (DSPM) space.
read more
Europe, Global Security News, North America, Vulnerabilities
Russian Hackers Declare War on Lithuania — Killnet DDoS Panic
by Richi Jennings •
NATO member Lithuania is under attack from Russian hacking group Killnet. It raises serious concerns over Russia’s use of cyber warfare against NATO states.
The post Russian Hackers Declare War on Lithuania — Killnet DDoS Panic appeared first on Secur…
Global Security News
Google Introduces New Capabilities for Cloud Armor Web Security Service
by Ionut Arghire •
Google today announced a new set of features for Cloud Armor, its distributed denial-of-service (DDoS) mitigation service and web application firewall (WAF).
read more
Europe, Global Security News, North America
What is a Virtual Machine (VM)?
by Kelsey Kinzer •
What is a virtual machine (VM)? Discover the basics of VMs, how they work, and the terminology associated with virtualization.
The post What is a Virtual Machine (VM)? appeared first on JumpCloud.
The post What is a Virtual Machine (VM)? appeared first…
Global Security News, Vulnerabilities
Cyolo Banks $60M Series B for ZTNA Technology
by Ryan Naraine •
Cyolo, an Israeli startup building technology for zero trust networking, on Monday announced a new $60 million investment led by the venture investing arm of National Grid.
In addition to National Grid Partners, Cyolo said it scored investments from Gl…
Europe, Global Security News, North America
JumpCloud HRIS — How JumpCloud Makes it Happen
by Brenna Lee •
Learn more about how JumpCloud’s pre-built HR integrations, and how the open HRIS integration works with all popular HR platforms.
The post JumpCloud HRIS — How JumpCloud Makes it Happen appeared first on JumpCloud.
The post JumpCloud HRIS — How JumpCl…
Global Security News, Vulnerabilities
New Database Catalogs Cloud Vulnerabilities, Security Issues
by Eduard Kovacs •
Cloud security company Wiz has announced the launch of a new database whose goal is to keep track of vulnerabilities and other security issues affecting cloud services.
read more
Europe, Global Security News, North America
ADPPA US Privacy Law: Coming Soon in Wake of Roe v. Wade Redo
by Richi Jennings •
We could soon have a federal GDPR. But the American Data Privacy and Protection Act wasn’t the only privacy related issue on Capitol Hill last week.
The post ADPPA US Privacy Law: Coming Soon in Wake of Roe v. Wade Redo appeared first on Security Boul…
Europe, Global Security News, North America, Vulnerabilities
NSA Wants To Help you Lock Down MS Windows in PowerShell
by Richi Jennings •
A new cheatsheet from four infosec agencies tells us how to use PowerShell for good, rather than let scrotes misuse it to “live off the land.”
The post NSA Wants To Help you Lock Down MS Windows in PowerShell appeared first on Security Boulevard.
Europe, Global Security News, North America
NIST Sets SSE Framework in Final SP 800-160 Guidance
by Nathan Eddy •
The National Institute of Standards and Technology (NIST) published a final version of updated standards for systems security engineering (SSE) with significant content and design changes, including a renewed emphasis on the importance of systems engi…
Europe, Global Security News, North America
AWS Security Best Practices
by Editor •
Discover AWS security best practices to follow while hardenign your cloud environment. Amazon Web Services is a cloud computing platform that offers computing power, storage space, content delivery and other functionalities.
The post AWS Security Best …
Global Security News, Vulnerabilities
Top Cryptographers Flag ‘Devastating’ Flaws in MEGA Cloud Storage
by Ryan Naraine •
Cryptographers at Swiss university ETH Zurich have found at least five exploitable security flaws in the privacy-themed MEGA cloud storage service and warned that the issues could lead to “devastating attacks on the confidentiality and integrity of use…
Europe, Global Security News, North America
JumpCloud Named Top-Ranking Software Provider in G2 Summer 2022 Reports
by Ashley Gwilliam •
It’s that time again — where the JumpCloud Directory Platform crushes it in G2’s Seasonal Reports. Like DJ Khaled, it seems “all we do is win.”
The post JumpCloud Named Top-Ranking Software Provider in G2 Summer 2022 Reports appeared first on JumpClou…
Global Security News, Vulnerabilities
Aqua Security Ships Open-Source Tool for Auditing Software Supply Chain
by Ryan Naraine •
Cloud security startup Aqua Security has partnered with the Center for Internet Security (CIS) to create guidelines for software supply chain security and followed up by shipping an open-source auditing tool to ensure compliance with the new benchmark….
Europe, Global Security News, North America, Vulnerabilities
Hacker Paige Thompson Could Face 45 Years in Prison — ‘Suicide by Law Enforcement’
by Richi Jennings •
Capital One hacker Paige A. Thompson has been found guilty. But it has to be said that Capital One’s security design was absolutely awful.
The post Hacker Paige Thompson Could Face 45 Years in Prison — ‘Suicide by Law Enforcement’ appeared first on S…
Global Security News, Vulnerabilities
RevealSecurity Raises $23M for Application Detection and Response
by Ryan Naraine •
RevealSecurity, an Israeli data security startup building technology to thwart malicious insider threats, on Tuesday announced the closing of a $23 million funding round led by SYN Ventures.
In addition to SYN Ventures, Hanaco Ventures, SilverTech Vent…
Europe, Global Security News, North America
Establish security boundaries in your on-prem AD and Azure environment
by Jonas Bülow Knudsen •
Preventing escalation from initial access in your Active Directory (AD) environment to Domain Admins can feel impossible, especially after years of successful red team engagements finding new attack paths each time. While securing your critical assets …
Global Security News, North America
Increased security driving investments in cloud computing
by Help Net Security •
Aptum has announced a report which examines the complexities inherent in hybrid cloud environments and their implications on security, data governance, compliance and disaster recovery. In particular, it finds that while companies are convinced of the …
Europe, Global Security News, North America, Vulnerabilities
HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook
by Richi Jennings •
A study shows many U.S. hospitals are leaking personal information to Facebook. Experts say it’s a HIPAA violation.
The post HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook appeared first on Security Boulevard.
Global Security News
Now On Demand: SecurityWeek Cloud Security Summit, Presented by Palo Alto Networks
by SecurityWeek News •
read more
Global Security News
Hybrid Networks Require an Integrated On-prem and Cloud Security Strategy
by John Maddison •
Today’s dynamic networks change so fast that traditional point security solutions fail to keep up
read more
Europe, Global Security News, North America, Vulnerabilities
Deepfence FAQ – June 2022
by Jamie Gale •
Welcome to our first FAQ blog post where we recap popular questions we’ve received along with the answers to them. What is the inspiration for this particular post? While on the road recently, at KubeCon + CloudNativeCon Europe, as well
The post Deepfe…
Europe, Global Security News, North America
Survey: Maintaining Cybersecurity Balance is a Challenge
by Michael Vizard •
A survey of 1,007 IT decision-makers at small-to-medium enterprises (SMEs) found two-thirds of respondents (66%) conceded that adding security measures resulted in more cumbersome user experiences. The survey polled SMEs in the U.S. and United Kingdom…
Global Security News, Vulnerabilities
‘MaliBot’ Android Malware Steals Financial, Personal Information
by Ionut Arghire •
Researchers at F5 Labs have nabbed a new Android malware family capable of exfiltrating financial and personal information after taking control of infected devices.
read more
Global Security News, Vulnerabilities
Volexity Blames ‘DriftingCloud’ APT For Sophos Firewall Zero-Day
by Ryan Naraine •
Big-game malware hunters at Volexity are shining the spotlight on a sophisticated Chinese APT caught recently exploiting a Sophos firewall zero-day to plant backdoors and launch man-in-the-middle attacks.
read more
Europe, Global Security News, North America
IaaS vs. PaaS vs. SaaS
by Kelsey Kinzer •
Learn more about infrastructure-as-a-service (IaaS) vs. platform-as-a-service (PaaS) vs. software-as-a-service (SaaS) in this post.
The post IaaS vs. PaaS vs. SaaS appeared first on JumpCloud.
The post IaaS vs. PaaS vs. SaaS appeared first on Security …
Europe, Global Security News, North America, Vulnerabilities
Chaining MFA-Enabled IAM Users with IAM Roles for Potential Privilege Escalation in AWS
by emmaline •
Overview In AWS, sts:AssumeRole is an action within AWS’s Security Token Service that allows existing IAM principals to access AWS resources to which they may not already have access. For example, Role A can assume Role B and then use Role B’s privile…
Europe, Global Security News, North America
4 Cloud Application Security Best Practices
by Gilad David Maayan •
In today’s digital-first landscape, more and more organizations move their workloads to the cloud. However, many do not realize that cloud environments come with a certain set of unique security threats. In this article, you will learn about top clou…
Europe, Global Security News, North America
How to Build Cybersecurity Resilience
by A.N. Ananth •
Cybersecurity has been changing rapidly over the past couple of years, due in no small part to the COVID-19 pandemic. In response, organizations have digitized at an unprecedented rate and, in the process, created new opportunities for cybersecurity s…
Europe, Global Security News, North America
How to Build Cybersecurity Resilience
by A.N. Ananth •
Cybersecurity has been changing rapidly over the past couple of years, due in no small part to the COVID-19 pandemic. In response, organizations have digitized at an unprecedented rate and, in the process, created new opportunities for cybersecurity s…