Security News
A 3D printer remote monitoring company accidentally exposed users' printers to each other after a cloud reconfiguration snafu.Jiang added that his team had been "Notified of a case in which a user started a print on someone else's printer" - and linked through to a Reddit post where someone had used a stranger's printer to print the words: "TSD is not secure/ I randomly connected /sorry had to inform u.".
A 3D printer remote monitoring company accidentally exposed users' printers to each other after a cloud reconfiguration snafu. Jiang added that his team had been "Notified of a case in which a user started a print on someone else's printer" - and linked through to a Reddit post where someone had used a stranger's printer to print the words: "TSD is not secure/ I randomly connected /sorry had to inform u.".
The public cloud shared security model may lead to gaps in the telemetry. On occasion, DevOps teams may also reduce logging on end systems and applications to reduce CPU usage, leading to additional gaps in telemetry data.
Iboss announced the general availability of three new features that have been added to the iboss Cloud Platform: API Cloud Access Security Broker, Advanced CASB controls and Remote Browser Isolation. "The future of work is anywhere, and organizations need to ensure they have the right checks and balances in place to ensure their users are securely connected to any application they need from any device, all in the cloud. Part of this requires additional control and visibility into how employees are accessing the resources they need to stay productive," said Paul Martini, CEO of iboss.
Cloud deployments are also a huge source of data leaks, and third-party data providers running in the cloud continue to be a source of data leaks from otherwise secure organizations.Security is paramount for the companies who build and maintain the major clouds like Azure, AWS, Google Cloud Platform and others - Microsoft for example has an extremely well-developed process to secure its hypervisor layer.
On the face of it, the cloud fundamentally changes how security teams investigate and remediate incidents. The complacent might think that the cloud providers, with all their resources, should have them covered.
The new contribution to the open source Kubernetes ecosystem addresses the need for organizations to easily deploy, run and manage Kubernetes clusters directly on top of bare metal servers, increasing performance and minimizing cost and operational effort."Running Kubernetes directly on bare metal servers is the next big thing for the Kubernetes community, but it has been challenging and difficult to implement," said Tenry Fu, CEO, Spectro Cloud.
Researchers at FireEye's threat intelligence and incident response unit Mandiant have identified a critical vulnerability that exposes millions of IoT devices to remote attacks. The flaw was found in a core component of the Kalay cloud platform for IoT devices offered by ThroughTek, a Taiwan-based company that provides IoT and M2M solutions for surveillance, security, smart home, cloud storage, and consumer electronics systems.
In this interview with Help Net Security, Melissa Sutherland, Senior Vice President at Booz Allen Hamilton, talks about multi-cloud maturity, cloud migration strategies, as well as the evolution of the cloud in the near future. Most federal agencies have begun their journey to implement enterprise cloud strategies, although at varying degrees of maturity.
Baffle's no-code, simple-to-deploy security mesh takes a data-centric approach at cloud scale without a performance impact or changes to applications. Baffle is the only data-centric security solution that universally protects data as it's created, stored and processed, from any source to any destination, on premises or in the cloud, no matter where it lives.