Unified Access Management for Cloud Servers

A new marketing term is being thrown about in the identity and access management space. To many IT admins it is unclear what this term means and what it covers. This new key term is called unified access management, and many can’t help but wonder how this will improve identity management in their environment. For The post Unified Access Management for Cloud Servers appeared first on JumpCloud.
Read more

Cyber Security Roundup for March 2018

In the wake of the global political fallout over the Salisbury nerve agent attack, there are reports of a growing threat of Russian state or Russian state-affiliated hacking groups conducting cyber attack reprisals against UK organisations, government officials have directly warned bosses at electricity, gas and water firms, Whitehall departments and NHS hospitals to prepare for a state-sponsored cyber assault. Russian group Fancy Bear (APT28) were suspected of being behind an unsuccessful attack against the UK anti-doping agency, and China tied hacking group APT15 were found to have infiltrated a UK...
Read more

Unified Access Management for AWS® Servers

With the emergence of web-based applications, cloud infrastructure, and an increase in Mac and Linux systems in the identity management landscape, it has become a challenge for IT admins to securely manage and connect their users to the IT resources they need. Unfortunately, providing users access to all of their resources hasn’t always been done The post Unified Access Management for AWS® Servers appeared first on JumpCloud.
Read more

Preventing Azure Storage Breaches

In my previous post, I took deep dive into AWS S3 permissions to outline the myriad of ways someone could expose their AWS S3 buckets and objects to everyone on the Internet. As I discussed there, the complexity of the S3 permission system is very powerful and provides users with a lot of flexibility; however, … Read More The post Preventing Azure Storage Breaches appeared first on The State of Security.
Read more

AWS Security Tech Tips: Programmatic Onboarding of AWS Accounts to ESP Using CloudFormation and Python

In an effort to reduce vulnerabilities and improve control over their cloud environments, an increasing number of AWS customers rely on the Evident Security Platform (ESP) to automate both the discovery and remediation of sensitive security issues. Integral to this mission is reducing the amount of time it takes to provision the resources necessary for... Read more » The post AWS Security Tech Tips: Programmatic Onboarding of AWS Accounts to ESP Using CloudFormation and Python appeared first on Cloud Sentry...
Read more

New Study Shows 20% of Public AWS S3 Buckets are Writable

Data exposure reports have reached a dizzying pace in the past few months, and the security community has been focused on the risk from multiple angles. Now, a new study from HTTPCS gives us new insight into rates of vulnerable S3 configurations. HTTPCS scanned s3.amazonaws.com addresses looking for storage “buckets” and logged data on which … Read More The post New Study Shows 20% of Public AWS S3 Buckets are Writable appeared first on The State of Security.
Read more

Cloud Directory feature AWS Server User Management

IT networks are changing dramatically right before our eyes. Perhaps nowhere is that change more visible than in the data center. The migration of infrastructure from on-premises to the cloud has been so acute that Cisco recently reported that cloud data centers are expected to process 94% of workloads and compute instances by 2021. Clearly, The post Cloud Directory feature AWS Server User Management appeared first on JumpCloud.
Read more
Page 1 of 712345...Last »