Lion Air Data Breach! Another Misconfigured S3 Bucket According to Dark Reading, Lion Air’s breach resulted when files containing the Indonesian airlines’ passenger names, passport numbers, birth dates, home addresses, and other data — was left openly accessible in an…
Ecuador’s Population Exposed in Data Breach We’ve seen a multitude of company data breaches this year, and a lot of those as a result of an exposed Elastic Search Server, but an entire population being exposed, especially pertaining to children, is…
Keeping Your Business Safe in the Cloud Era
CTO and co-founder of DivvyCloud, Chris DeRamus recently spoke with spoke with Business and Tech on how businesses can transition to the cloud safely and productively.
What sorts of things can be identified as potential threats to data? Consumer privacy (or lack thereof) is a huge societal concern, and concerns about protecting privacy is manifesting itself through many forms, including regulation like the California Consumer Privacy Act and General Data Protection Regulation. As a backdrop to this is the shocking news that 2019 is on track to be the worst year on record for data breaches, according to a report from Risk Based Security. The research found the number of reported breaches and number of exposed records has increased by more than 50 percent compared to the first six months of 2018, with over 3,800 data breaches reported in the first half of 2019.
The biggest potential threat to data is misconfigurations of cloud services. Too often, companies are not investing appropriately in security and compliance, sacrificing these efforts in the name of speed of innovation. This rush opens them up to both insider and outsider threats, where malicious actors are able to gain access to data that has been exposed unintentionally.
Importantly, it doesn’t have to be this way. Companies are often presented with a false choice, that they can either have security or go fast. In fact, they can have both if they make the proper investments in people, processes, and tools. For example, this emerging category of software that makes up what Gartner calls Cloud Security Posture Management (CSPM) needs to be a required component of companies’ digital transformation strategies.
How do you remedy a threat to your business? Check out Business and Tech’s article to find out …
Are you ready to achieve continuous Security, Compliance and Governance in your Clouds today? Speak with a DivvyCloud expert today!
Watch DivvyCloud’s 60-second video to learn how we help customers like GE, 3M, Autodesk, Discovery, and Fannie Mae stay secure and compliant.
DivvyCloud minimizes security and compliance risk by providing virtual guardrails for security, compliance, and governance to customers embracing the dynamic, self-service nature of public cloud, and container infrastructure. Customers like General Electric, Discovery Communications, and Fannie Mae run DivvyCloud’s software to achieve continuous security governance in cloud and container environments (AWS, Azure, GCP, Alibaba, and Kubernetes). First, our software performs real-time, continuous discovery of infrastructure resources allowing customers to identify risks and threats. Second, customers can implement out-of-the-box or custom cloud-native policy guardrails that identify and alert on violations. Third, we automate the enforcement and remediation of these policies.
*** This is a Security Bloggers Network syndicated blog from DivvyCloud authored by David Mundy. Read the original post at: https://divvycloud.com/blog/keeping-your-business-safe-in-the-cloud-era/