Tag: Cloud Security

Here you will find all the articles with the tag: Cloud Security.

“Telcos are very often victims of cloud attacks”

“Telcos are very often victims of cloud attacks”

Sysdig has just released its annual Global Cloud Threat Report. Because of the complexity of cloud environments, hackers can often be difficult to detect while having an attack in place within 10 minutes of discovering credentials. The Sysdig team warns that a recon alert is the last chance for ... Read more

date8 months ago
AWS unveils new and expanded security offerings

AWS unveils new and expanded security offerings

Amazon is making several new security tools and services available to its cloud computing customers. This week at the AWS re:Inforce event, Amazon introduced its latest offerings in the security arena. Speaking at the event's keynote, Becky Weiss, a Senior Principal Engineer at AWS, said the com... Read more

date10 months ago
Google’s new detection tool gives companies an edge over hackers

Google’s new detection tool gives companies an edge over hackers

Google adds a new detection tool to its Security Command Center. It should help companies by securing their cloud environments. Cloud environments are hard to secure due to their dynamic and complex nature. Google thinks it has the solution and adds a simulation tool to detect attack paths to it... Read more

date10 months ago
Secure Web Proxy in Google Cloud generally available

Secure Web Proxy in Google Cloud generally available

Google Cloud is making Secure Web Proxy (Cloud SWP) generally available. Companies can deploy it to transfer workloads to remote environments securely. Again a managed service is becoming generally available today from Google Cloud. The cloud provider is pushing those services hard this year du... Read more

date10 months ago
Crowdstrike protects your cloud environment with new features

Crowdstrike protects your cloud environment with new features

CrowdStrike adds security features for a secure cloud environment. One feature focuses on securing cloud instances, while another gives administrators insight into hackers' attack techniques. The last of tree additions is available exclusively to AWS customers. Crowdstrike's cybersecurity platf... Read more

date10 months ago
Critical vulnerability in file transfer service MOVEit

Critical vulnerability in file transfer service MOVEit

A vulnerability in Progress' managed file transfer service MOVEit is currently being actively exploited. U.S. cybersecurity regulator CISA is calling for patching as soon as possible. MOVEit is specifically designed to provide compliant file-sharing with sensitive data. To do this, the service c... Read more

date10 months ago
Nearly all companies have misconfigurations in cloud environments

Nearly all companies have misconfigurations in cloud environments

Nearly all organizations (98.6 percent) are experiencing worrisome misconfigurations that pose significant risks to data and infrastructure. According to research by Zscaler, the increasing use of cloud technology is leading to more and more vulnerability problems. In the study, Zscaler finds th... Read more

date1 year ago
1 2 3 12