Security News

Guide for comparison of cloud security solutions (German)
2022-02-16 00:00

In 2021, securing your network is more challenging than ever - you need to secure users, devices, apps, and data at the point of access, working at the cloud edge to deliver protection and performance. Your choice of cloud security platform and partner is key, as it will serve as a foundation for the way you grow and evolve to meet new challenges - for example, meeting the new standards defined by Gartner as part of their forward-thinking secure access service edge architecture.

Cloud security training is pivotal as demand for cloud services explode
2022-02-11 06:30

According to the Statista Cloud Market Share publication, Amazon Web Services, Microsoft Azure, and Google Cloud Platform are the three largest cloud service providers, having captured over 60% of the market between them. The cloud is no cyber security panacea, and data breaches involving the cloud show no sign of abating.

Week in review: 2022 cloud security trends, Microsoft fixes wormable RCE
2022-01-16 09:00

Phishers are targeting Office 365 users by exploiting Adobe CloudPhishers are creating Adobe Creative Cloud accounts and using them to send phishing emails capable of thwarting traditional checks and some advanced threat protection solutions, Avanan security researcher Jeremy Fuchs warns. Microsoft fixes wormable RCE in Windows Server and WindowsThe first Patch Tuesday of 2022 is upon us, and Microsoft has delivered patches for 96 CVE-numbered vulnerabilities, including a wormable RCE flaw in Windows Server.

6 cloud security trends to watch for in 2022
2022-01-10 04:30

There has been a lot of innovation that has sparked a new wave of technologies - from the boom in serverless technologies to the evolution of cloud automation security. These innovations have enabled organizations to improve business agility and reduce costs; but they've also increased the attack surface as demonstrated by a recent IDC report, which highlights that 98% of organizations suffered at least one cloud security breach in the previous 18-months.

How to tackle hybrid cloud security and DevSecOps
2021-12-21 20:29

With the foundational security provided by Red Hat Enterprise Linux(RHEL), the layered products that run on top, such as Red Hat OpenShift, benefit by inheriting the security technologies provided by RHEL. Red Hat has packaged and delivered trusted Linux content for years and now delivers that same trusted content packaged as Linux containers, through the Red Hat Universal Base Image. This allows enterprises to build a security-focused hybrid cloud, manage and control a hybrid cloud with integrated security, and build, deploy, and run security-focused applications on top of a hybrid cloud using DevSecOps practices.

How to keep on top of cloud security best practices
2021-12-20 08:30

The growing awareness of cloud misconfigurations comes at a time of huge growth in cloud platforms. On one hand, 87 percent said they were fully or mostly in control of their remote working environment, with 51 percent crediting the acceleration of cloud migration as an influence that had improved their security best practice.

Foundational cloud security with CIS Benchmarks
2021-12-15 04:30

The CIS Foundations Benchmarks are a part of the family of cybersecurity standards managed by CIS. CIS Benchmarks are consensus-based, vendor-agnostic secure configuration guidelines for the most commonly used systems and technologies. The CIS Foundations Benchmarks are intended for system and application administrators, security specialists, auditors, help desk, platform deployment, and/or DevOps personnel who plan to develop, deploy, assess, or secure solutions in the cloud.

What Are Your Top Cloud Security Challenges? Threatpost Poll
2021-12-03 17:47

We want to know what your biggest cloud security concerns and challenges are, and how your company is dealing with them. Weigh in with our exclusive poll!

Cloud Security: Don’t wait until your next bill to find out about an attack!
2021-11-26 19:58

Firstly, crooks show up fast: occasionally, it takes them days to find newly-started, insecure cloud instances and break in, but Google wrote that discover-break-and-enter times were "As little as 30 minutes." Importantly, in our research, the cloud instances we used weren't the sort of cloud server that a typical company would set up, given that they were never actually named via DNS, advertised, linked to, or used for any real-world purpose.

For adapting to new cloud security threats, look to “old” technology
2021-10-05 06:00

While there is a time and place for onboarding additional cloud security solutions, it can also be easy to fall prey to the shiny object syndrome surrounding emerging solutions that are created in response to new security threats. Before rushing to invest in a new solution remember that matching additional solutions to emerging threats in a one-to-one game of whack-a-mole is not a sustainable strategy.