Cloud Security
6 Significant Cloud Security Threats
Organizations and businesses have had to turn to third-party cloud and managed security services to look for ways to bolster cybersecurity and shift from legacy to modern data platforms. However, the sudden ...
IT security under attack: Why are group memberships so crucial?
Security groups either make or break your IT security. Group memberships are responsible for administrative access in your your network and define access to other privileged resources and data on your domain ...
Mitigating Cloud Supply-chain Risk: Office 365 and Azure Exploited in Massive U.S Government Hack
The central issue behind the latest headline-grabbing security breach – an incident that directly impacted several major US government agencies – highlights pervasive issues related to many organizations’ use of the popular ...
3 Million Chrome Users Infected via Extensions—Here We Go Again
28 browser extensions for Chrome and Edge were laced with malware, says an anti-virus vendor ...
Which Third-Party Pods Do You Need in Your K8s Cluster?
A production-grade Kubernetes cluster has many requirements. For example, applications and services should be able to communicate across nodes and be served to external users. Traffic from these users should be properly ...
Why Your Cloud Security Team Ignores Security Alerts
Understanding, fighting, and preventing alert fatigue in AWS, Azure, and Google Cloud The post Why Your Cloud Security Team Ignores Security Alerts appeared first on Sonrai Security ...
Solarwinds Vulnerabilty: Address the Basics First
The post Solarwinds Vulnerabilty: Address the Basics First appeared first on Fidelis Cybersecurity ...
10 Ways to Protect Against DDoS Attacks
Distributed denial-of-service (DDoS) attacks continue to grow in size, frequency, and complexity, threatening businesses and service providers around the world. A warning was recently issued about a steep uptick of DDoS attack ...
Bitglass Security Spotlight: Popular Messaging App Exposes Users’ Private Data.
Here are the top stories of recent weeks: Go SMS Pro Users’ Private Data Leaked Ransomware Hits Hosting Provider, Managed.com Cryptocurrency Exchange Portal Experiences Security Breach. Capcom Confirms Data Breach via Ransomware ...
Smartphones are not the problem with MFA security
We've recently seen big attacks play out on prominent technology companies despite their use of smartphone-based multi-factor authentication. These attacks are real, they do happen, and it appears that even the smartphone ...
