Two-thirds of cloud breaches can be prevented by proper configuration
New research has come out suggesting that two-thirds of cloud security incidents could have been avoided if the apps, databases, and security policy configurations were done properly. A lot of configuration mistakes or lack of secure policies make companies vulnerable.
IBM Security X-Force p... Read more
AMD’s Secure Encrypted Virtualization is not so secure after all
Security researchers from Technische Universität Berlin have devised an attack that proves AMD's Secure Encrypted Virtualization (SEV) is not as safe as it seems. The researchers designed an attack that defeats what the silicon safe room technology was devised for; protecting the data in virtual m... Read more
Google releases Unattended Project Recommender to optimize cloud costs
Google announced a new feature of Active assist on August 6. Named Unattended Project Recommender, the feature is a collection of Google's tools designed to help optimize Google Cloud environments.
Unattended Project Recommender aims to provide a unified tool to discover, reclaim, and shut down ... Read more