Stealing Infrastructure Cryptomining Attacks

Juniper Networks: Cryptomining Exploit Targeting Docker Containers

Juniper Networks revealed today cybercriminals are now employing Docker containers to surreptitiously run cryptomining malware on public clouds. Researchers at Juniper Threat Labs have discovered an infection in the wild that hunts ...
Security Boulevard
Ensure a Secure Cloud Migration

5 Tips to Ensure a Secure Cloud Migration

The internet is awash with compelling statistics on the explosive growth of cloud computing. A stat most relevant for this article is that 83 percent of enterprise workloads will be in the ...
Security Boulevard
Mitigating Risks of Shadow IT

Mitigating Risks of Shadow IT with CASBs

According to the RightScale “2018 State of the Cloud Report,” 81 percent of companies are now using the cloud, an indication that it has more than delivered on its promises of efficiency, ...
Security Boulevard
SAP CISO: Application Security Still Too Difficult

SAP CISO: Application Security Still Too Difficult

Many advances in application security have been made over the years, yet building and deploying secure applications remains a challenge for even the most well-heeled of organizations. Justin Somaini, chief information security ...