Category: Cloud security

Cloud security

5,000 Twitter Accounts Linked to Disinformation Campaigns

June 18, 2019

Via: Threat Post

Twitter has removed six sets of accounts that the site has deemed to be devoted to coordinated, state-backed propaganda activities – totaling about 5,000 accounts in all. “We believe that people and organizations with the advantages of institutional power and […]

Cloud security, Network security, Security

IoT Security Regulation is on the Horizon

June 6, 2019

Via: Threat Post

Internet of things (IoT) device security continues to worry the tech industry – however, experts believe that the right type of global regulation could be key for ensuring security standards. The question is when those regulatory efforts will be fleshed […]

Cloud security

Embrace chaos to improve cloud infrastructure resilience

June 5, 2019

Via: Help Net Security

Netflix is a champion of using chaos engineering to improve the resilience of its cloud infrastructure. That’s how it ensures its customers don’t have their Stranger Things binge-watching sessions interrupted. Netflix is one of a growing number of companies including […]

Cloud security, Mobile security

Is ‘Sign in with Apple’ Marketing Spin or Privacy Magic? Experts Weigh In

June 5, 2019

Via: Threat Post

Apple’s “Sign in with Apple” feature promises to protect user privacy – and while many are looking at that claim as more of a marketing move than anything else, authentication experts say it has the potential to have an enormous […]

Cloud security, Mobile, Mobile security, Vulnerabilities, Wireless security

Microsoft Beefs Up Wi-Fi Protection

May 27, 2019

Via: Threat Post

Microsoft has begun pushing out its May 2019 Windows 10 update, which will flag Wi-Fi networks that are using the outdated and insecure Wired Equivalent Privacy (WEP) and Temporal Key Integrity Protocol (TKIP) authentication mechanisms. WEP was introduced in 1997 […]

Access control, Cloud security, Security

Goodbye Passwords: Hello Identity Management

May 24, 2019

Via: Threat Post

Keeping track of user names and passwords sounds easy, but it is not. In a world where protected network resources are accessed by employees on mobile devices, outside contractors, web applications and internet of things (IoT) devices – passwords just […]

Application security, Cloud security

A Brief History of Containerization: Why Container Security Best Practices Need to Evolve Now

May 10, 2019

Via: Security Intelligence

Think about a revolutionary invention. What’s the first thing that comes to mind? Maybe it’s the advent of the internet, or perhaps your brain skipped all the way back to the steam engine. When asked that question, how many people […]

Cloud security, Malware

Verizon Data Breach Report: Espionage, C-Suite and Cloud Attacks on the Rise

May 9, 2019

Via: Threat Post

Corporate espionage is on the rise as a motivation for cyberattacks, with a full quarter of all network compromises associated with reconnaissance and data exfiltration in the last 12 months. However, financially motivated attacks aren’t going anywhere; social-engineering attacks aimed […]

Cloud security, Security

The 2019 State of Cloud Security

May 3, 2019

Via: Dark Reading

The state of cloud security is improving — or, at the very least, it isn’t backsliding. But as cloud technology grows more prevalent and more complicated, security teams are going to need to keep innovating with improved controls and integrations. […]

Cloud security, Security

Security and compliance obstacles among the top challenges for cloud native adoption

May 1, 2019

Via: Help Net Security

Cloud native adoption has become an important trend among organizations as they move to embrace and employ a combination of cloud, containers, orchestration, and microservices to keep up with customers’ expectations and needs. To discover more about the motivations and […]