Cloud Security
Why Service Mapping is Critical for Microservices Security
Service mapping serves as an essential tool for ensuring robust microservices-based application security. ...
Blameless Locks Down Security Incident Management Over Slack
Blameless is making it simpler for security operations teams to manage multiple conversations and security incidents across Slack ...
Securing Your Cloud Environment: Understanding and Addressing the Challenges in Cloud Security
As enterprises rapidly migrate critical infrastructure and data to the cloud, they lose visibility and control. A recent report shows 80% of organizations encountered a significant security incident related to their cloud ...
Konstellation: A Tool for RBACpacking in Kubernetes
The author presented this paper and corresponding tool at Black Hat: Arsenal 2023 on August 10, 2023. For a more general overview of Konstellation and its capabilities vis a vis Kubernetes RBAC, ...
New Study Backs An Identity-First and Inside-Out Approach to Cloud Security
Reading Time: 4 minutes TechTarget’s Enterprise Strategy Group released a new report detailing why proper management of identity and access is critical to reducing cloud security risk. The report includes recent market ...
Google Cybersecurity Action Team Threat Horizons Report #7 Is Out!
This is my completely informal, uncertified, unreviewed and otherwise completely unofficial blog inspired by my reading of our seventh Threat Horizons Report (full version) that we just released (the official blog for ...
Google Report Reveals Most Widely Used Cloud Attack Vectors
A Google report showed the majority of cloud security issues involved stolen credentials followed by misconfigurations ...
Securely Transitioning to a Cloud-native Application Development Environment
Preparing to transition to cloud-native application development? Learn what steps you need to take do it securely. The post Securely Transitioning to a Cloud-native Application Development Environment appeared first on Signal Hill ...
As Breach Costs Soar, Organizations Need Data Protection Across the Multi-Cloud
In a world where vendor marketing is all-pervasive, trustworthy industry data can be a godsend for the time-poor IT buyer. Now in its 18th year, the IBM Cost of a Data Breach ...
How to use a cyber incident response plan template
Incident management isn’t easy. In fact, for most K-12 school districts, it’s an ongoing challenge. Fortunately, you’re in luck: We’ve created a free-to-use cyber incident response plan template — made specifically for ...