Excessive permissions derive from a complex chain of permissions that is hard to determine, visually present and keep up with manually

6 Tips for Understanding 3rd-Party Risk in the Cloud

| | Cloud
Most organizations are unaware of the security risk that third parties pose to their cloud infrastructure and the importance of managing their permissions. The post 6 Tips for Understanding 3rd-Party Risk in ...

Misconfigurations of Cloud-Managed Infrastructures Continue to be a Major Challenge to Data Security

In case you missed the memo, cloud-hosted data is here to stay. Recent data shows spending on cloud services reached a total of $178 billion in 2021, a 37 percent increase over ...
Excessive cloud permissions are a security weak spot that attackers seek to exploit

How to Improve Your Incident Response in the Cloud

| | Cloud
A look at the security best practices and mindset to adopt to better detect and recover from malicious activity in your cloud infrastructure The post How to Improve Your Incident Response in ...
CISA security tools Microsoft 365 Google

DRaaS Leads Companies Into the World of Cloud

As more and more large enterprises adopt cloud technologies, there are still many small- and medium-sized companies that have yet to take that leap. There are economic incentives that make the movement ...
Security Boulevard

What You Should Know about the New OpenSSL Vulnerability

| | Cloud
Find out how to detect which OpenSSL version you’re running and if your organization is exposed to the critical OpenSSL vulnerability - and what to do about it. The post What You ...
Average cost of a data breach in recent years, Cost of a Data Breach Report 2022, IBM Security

IBM Cost of a Data Breach 2022 – Highlights for Cloud Security Professionals

| | Cloud
Learn from the 2022 IBM cost of a data breach report how much ransomware, credential and other breaches are impacting the budget. The post IBM Cost of a Data Breach 2022 – ...
Select enumerations in non-Error, non-Misuse breaches (n=4,250), Verizon 2022 Data Breach Investigations Report

Verizon’s 2022 Data Breach Report – Insights for Cloud Security Professionals

| | Cloud
Wondering which cyber attacker trends are putting your organization at risk? Learn about the leading threat vectors – and how cloud security solutions can help. The post Verizon’s 2022 Data Breach Report ...
Google software security

Today’s Threats, Tomorrow’s Skill Sets?

Being aware of emerging threats and how they impact technologies is key to bolstering defenses. But can this knowledge also prove useful to your career? Today, the top skill sets employers are ...
Security Boulevard
🥇

Cyber Security DE:CODED – Ransomware

“There’s usually about 30% corruption in backups” Show notes for series 2, episode 5 Ransomware is feared by businesses all over the world. What happens during and after an attack? We give ...
👉

Five Lessons Every Cybersecurity Team Can Learn from the Uber Incident

| | Cloud
Upon hearing of a cyber security incident, alleged or factual, the most productive thing to do is learn what you can from its main lessons The post Five Lessons Every Cybersecurity Team ...