IaaS
HALT! I am Reptar! Intel CPU Bug Panics Cloud Providers
Richi Jennings | | Cloud, Cloud IaaS, cpu, CPU attack, CPU flaw, CPU microcode, cpu vulnerability, Denial of Service, denial-of-service attack, DoS, IaaS, IaaS Security, Infrastructure as a Service (IaaS), Intel, Intel CPU, INTEL-SA-00950, Microcode Flaws, Redundant Prefix Issue, Reptar, SB Blogwatch, x86, x86_64
IaaS Catch Fire: Google and Intel fuzz, find and fix a fabulous bug. Next up: More of the same ...
Security Boulevard
AWS is Under Threat from Unused Privileges
Gabriel Avner | | Cloud Security, IaaS, IaaS Security, Identity-security first, privileged access, Uncategorized
Amazon Web Services (AWS) provides the backbone infrastructure for many organizations, making it a vital resource that needs to be protected. Sprawling across a wide range of apps and services, AWS is ...
IaaS vs PaaS vs SaaS: Which is the Right Platform for Your Business?
Dariel Marlow20 MIN READ | | cloud computing, Cloud Engineer, Cloud Security, IaaS, IaaS vs PaaS vs SaaS, paas, SaaS
The post IaaS vs PaaS vs SaaS: Which is the Right Platform for Your Business? appeared first on PeoplActive ...
Protecting Data in the Cloud: A Work in Progress
Throughout its history, the tech industry has had to deal with constant change, increasingly complex architectures and security challenges. Security is a particularly deep well of concepts to navigate. One offshoot of ...
Security Boulevard
Too Much of a Good Thing — Too much flexibility in permission management is putting IAM security at risk
As cloud services like Salesforce, AWS, and others have grown more robust over time, they have added more options for how IAM security teams can manage their organizations’ access... The post Too ...
Why IaaS Security Should be a Priority
Jonathan Andresen | | bitglass, CASB, Cloud Adoption, Cloud Data Protection, Cloud Security, digital footprint, IaaS, paas
Why are CIOs and IT organizations prioritizing investment in cloud infrastructure? The answer is simple: to better support virtual workforces, supply chains, and partners. Getting the most value out of legacy systems ...
Protecting Your Business Against Malware in the Cloud
There are multitudes of advantages that the cloud has to offer to companies. These include making the task of security management more accessible. However, there are still many gray areas associated with the ...
Solving the AWS Roles Mystery
In the AWS environment, permissions to access your organization’s resources are tied to your identity. This makes your identity incredibly valuable, your keys to the kingdom as it were. The post Solving ...
Extending NDR visibility in AWS IaaS
Vijit Nair | | Amazon GuardDuty, aws, dns, ec2, IaaS, NDR, network security monitoring, partnership, Product, SIEM, SSH, SSL-TLS, SUNBURST, Suricata, VPC traffic mirroring, Zeek
By Vijit Nair, Sr. Director, Product Management, Corelight Comprehensive visibility is challenging in a cloud environment. While these environments are rich sources of telemetry and logs, it is challenging for security teams ...
Imperva’s Comprehensive Data Security Platform for Cloud, Explained
Imperva recently introduced the industry’s first database-agnostic security platform specifically built for cloud. The Data Security solution unifies security management for organizations’ entire data environment, supporting databases wherever they’re hosted, including managed ...