Security News

Researchers Uncover Rust Supply Chain Attack Targeting Cloud CI Pipelines
2022-05-20 20:11

A case of software supply chain attack has been observed in the Rust programming language's crate registry that leveraged typosquatting techniques to publish a rogue library containing malware. Cybersecurity firm SentinelOne dubbed the attack "CrateDepression."

Easily migrate to the cloud with CIS Hardened Images
2022-05-18 02:55

CIS offers virtual images hardened in accordance with the CIS Benchmarks, a set of vendor agnostic, internationally recognized secure configuration guidelines. CIS Hardened Images provide users a secure, on-demand, and scalable computing environment.

Are You Investing in Securing Your Data in the Cloud?
2022-05-17 06:25

Robust cloud data security is imperative for businesses adopting rapid digital transformation to the cloud. Cloud data security entails securing data, whether at rest or in motion, on cloud-based infrastructure, applications, etc.

Remote work hazards: Attackers exploit weak WiFi, endpoints, and the cloud
2022-05-17 03:30

Attackers have seized on vulnerabilities in these environments, creating more work and larger budgets for security teams. The hybrid workforce reality is causing greater concerns with data leakage, ransomware and attacks through remote access tools and cloud services.

Get lifetime access to 2TB of cloud storage for just $49
2022-05-10 18:00

Get lifetime access to 2TB of cloud storage for just $49 We may be compensated by vendors who appear on this page through methods such as affiliate links or sponsored partnerships. Everybody needs safe, secure and reliable cloud storage.

SANS 2022 Cloud  Security Survey
2022-05-10 00:00

Over the past several years, we have seen more and more examples of vulnerabilities in cloud assets, cloud service provider outages, sensitive data disclosure, and breaches involving the use of public cloud environments. The 2021 Data Breach Investigations Report from Verizon, released in the second quarter of 2021, noted that compromised external cloud assets were more common than on premises assets in both incidents and breaches.

Automate Your Cloud-Native Security From Code to Cloud
2022-05-09 00:00

Bridgecrew by Prisma Cloud is the codified cloud security platform built to bridge the gap between DevOps and security teams. Powered by automation, Bridgecrew empowers teams to find, fix, and prevent vulnerabilities, misconfigurations, and license compliance issues in source code, containerized applications, and infrastructure as code.

Security and compliance rank as the top challenges for deploying cloud-native apps
2022-05-04 16:11

Security and compliance rank as the top challenges for deploying cloud-native apps. Tigera's State of Cloud-Native Security report is based on a survey of 304 security and IT professionals from around the world.

Dell brings data recovery tools to Apex and the cloud
2022-05-02 17:05

Dell is partnering with high-profile cloud-based data analytics vendor Snowflake to enable organizations to take the data they're keeping in their data centers in Dell object storage and run it in Snowflake's Data Cloud while keeping the data on premises or copying it to the public cloud, an important capability for companies with data sovereignty or privacy concerns who can't freely move it around. In another move to bridge the gap between data stored in central data center and in public clouds, Dell at the show is demonstrating how its block and file storage platforms can run in public clouds and how companies can buy the software as a managed service via cloud credits.

Deep Dive: Protecting Against Container Threats in the Cloud
2022-05-02 12:15

"Kubernetes attacks are actually quite common, especially given how popular the container orchestration software is," said Trevor Morgan, product manager at comforte AG. "The array of threats to Kubernetes environments is quite broad.". As an example of how popular targeting vulnerable cloud infrastructure has become, Akamai security researcher Larry Cashdollar recently set up a simple Docker container honeypot, just to see what kind of notice it might attract from the wider web's cadre of cyberattackers.