In the Face of a Pandemic, Cyberattackers Seek to Take Advantage

| | Blog
Cyberattackers live for moments of crisis and confusion. Government agencies and companies already stretched thin are at their most vulnerable, and cyberattackers are all too willing to apply overwhelming pressure to maliciously disrupt operations or gain some financial benefit. As … Read more The post In the Face of a ... Read More
Cloud Security

Full Life Cycle Cloud Security

| | Blog
When security teams find cloud vulnerabilities and misconfigurations at runtime, they are often blamed for introducing friction into the continuous integration/continuous delivery (CI/CD) pipeline and stifling the enterprise’s ability to innovate as efficiently as possible. But it is not the … Read more The post Full Life Cycle Cloud Security ... Read More
Ransomware note

S3 Bucket Ransomware Attack: What Is It and How Can It Happen?

| | Blog
Permission settings for cloud object storage services like S3 buckets are frequently the cause of data breaches. But Rhino Security Labs, a penetration testing and security assessment firm, is drawing attention to another concern. By leveraging S3 buckets as a … Read more The post S3 Bucket Ransomware Attack: What ... Read More
Feature Release 20.1

Feature Release 20.1

| | Blog
With each DivvyCloud release, we have a chance to demonstrate our customer-first mentality and reaffirm our opposition to pushing prescriptive, one-size-fits all cloud security solutions to our customers. We strive continuously to align our customers’ needs and priorities to our … Read more The post Feature Release 20.1 appeared first ... Read More

Security Isn’t a Four-Letter Word: How Infrastructure as Code Amplifies DevOps through the Inclusion of Security

| | Blog
Our fast-paced lives are fueled by innovative, cloud-native companies. We are able to watch our favorite programs and movies from anywhere in the world on any device. We are able to collaborate with our colleagues on an upcoming presentation, regardless … Read more The post Security Isn’t a Four-Letter Word: ... Read More

It’s Data Privacy (and Protection) Day!

| | Blog
We live in a data driven world, so it’s important to be good stewards of our own data and the data of others. Each year on January 28, we have a dedicated opportunity to raise awareness about the importance of … Read more The post It’s Data Privacy (and Protection) ... Read More

AWS Data Exposed on GitHub

| | Blog
Five hours isn’t very long. It’s a flight from New York to Los Angeles. It’s a little over half of a standard workday. But when viewed from the perspective of exposed data, it’s an eternity – or at least long … Read more The post AWS Data Exposed on GitHub ... Read More

CoStar Group | Customer Case Study

| | case-study
Case Study: How DivvyCloud Enables Continuous Multi-Cloud Security and Compliance Best Practices for CoStar During Mergers and Acquisitions Overview CoStar is the leading provider of commercial real estate information, analytics, and online marketplaces. They conduct expansive, ongoing research to produce … Read more The post CoStar Group | Customer Case ... Read More

Misconfigurations Can Happen to Anyone, Even Microsoft

| | Blog
Over the last 44 years, Microsoft has become a trusted name in technology. Their logo, a familiar and colorful quartet of squares, is a visual comfort to their enormous user community. Consumers have welcomed the company’s products into their homes … Read more The post Misconfigurations Can Happen to Anyone, ... Read More

How Protected is Your Health Information?

| | Blog
Protected Health Information (PHI) is the term given to health data created, received, stored, or transmitted by HIPAA-covered entities and their business associates in relation to the provision of healthcare, healthcare operations, and payment for healthcare services. This might not … Read more The post How Protected is Your Health ... Read More