Security News

Top Practices for Managing the Three Levels of AWS Security
2022-04-06 00:00

The nature of the expanding attack surface and advanced threats necessitates broader, more comprehensive protection. Security architects tasked with designing, implementing, and maintaining security for AWS environments should look for comprehensive solutions that deliver multilayer protections which augment native AWS tools.

Best Practices for Managing the Three Levels of AWS Security
2022-04-06 00:00

The nature of the expanding attack surface and advanced threats necessitates broader, more comprehensive protection. Security architects tasked with designing, implementing, and maintaining security for AWS environments should look for comprehensive solutions that deliver multilayer protections which augment native AWS tools.

Top Practices for Managing the 3 Levels of AWS Security
2022-04-06 00:00

The nature of the expanding attack surface and advanced threats necessitates broader, more comprehensive protection. Security architects tasked with designing, implementing, and maintaining security for AWS environments should look for comprehensive solutions that deliver multilayer protections which augment native AWS tools.

Best Practices for Managing the 3 Levels of AWS Security
2022-04-06 00:00

The nature of the expanding attack surface and advanced threats necessitates broader, more comprehensive protection. Security architects tasked with designing, implementing, and maintaining security for AWS environments should look for comprehensive solutions that deliver multilayer protections which augment native AWS tools.

Find out how FortiGate can Ensure the Best Protection for your AWS Workloads
2022-04-06 00:00

What is the best way to deliver business continuity in today's rapidly changing environment? You need agile deployments that seamlessly scale and deliver high availability, while maintaining security and ensuring regulatory compliance. To enable your organization to move faster, FortiGate Next Generation Firewall provides AI/ML driven advanced threat protection and scalable VPN connectivity to your AWS workloads.

Advanced Threat Defense for Your Business-critical Applications on AWS
2022-04-06 00:00

Fortinet's partnership with AWS ensures your workloads and applications on AWS are protected by best-in-class security solutions. With simplified security management, full visibility across environments, and broad, comprehensive protection, gain the ultimate flexibility and control you need to build in the cloud.

The Key to Optimizing Cloud Security on AWS eBook
2022-04-06 00:00

Learn how you can simplify security management, ensure full visibility, and achieve broad protection across your workloads and applications. The post The Key to Optimizing Cloud Security on AWS...

Best Practices for Managing the 3 Levels of AWS Security
2022-04-06 00:00

The nature of the expanding attack surface and advanced threats necessitates broader, more comprehensive protection. Security architects tasked with designing, implementing, and maintaining security for AWS environments should look for comprehensive solutions that deliver multilayer protections which augment native AWS tools.

Orca Security tells AWS fail tale with a happy ending
2022-01-13 21:02

On Thursday, Orca Security published details about Superglue and BreakingFormation, vulnerabilities in AWS Glue and AWS Cloud Formation that allowed attackers to access data for other customers and to access files and make server-side requests to internal web services infrastructure. "During our research, we were able to identify a feature in AWS Glue that could be exploited to obtain credentials to a role within the AWS service's own account, which provided us full access to the internal service API," explained Yanir Tsarimi in a blog post.

AWS fixes security flaws allowing access to AWS customer data
2022-01-13 20:04

Amazon Web Services has addressed an AWS Glue security issue that allowed attackers to access and alter data linked to other AWS customer accounts. The flaw stemmed from an exploitable AWS Glue feature and an internal service API misconfiguration that allowed Orca Security security researchers to escalate privileges to gain access to all service resources in the region.