Security

What the 2019 AWS Security Report Tells Us About Preventing a Cloud Data Breach

This post was originally published by siri oaklander. In the wake of the recent Capital One security breach in their cloud environment on AWS, the security community is taking another look at how we approach cloud security. CloudPassage recently shared guidance in our blog, “Capital One Data Breach: Non-Technical Tips To Not Be A Headline”. Here […]

Bitglass Security Spotlight: iPhones Susceptible to a Hack via Text

This post was originally published by Juan Lugo. Earlier this month, Natalie Silvanovich, a Google Project Zero researcher, presented multiple interaction-less bugs in Apple’s iOS iMessage client during the Black Hat security conference in Las Vegas. Silvanovich asserts that these bugs can be used to interact with a user’s device and exploit it. Although Apple […]

What the 2019 AWS Security Report Tells Us About Preventing a Cloud Data Breach

This post was originally published by siri oaklander. In the wake of the recent Capital One security breach in their cloud environment on AWS, the security community is taking another look at how we approach cloud security. CloudPassage recently shared guidance in our blog, “Capital One Data Breach: Non-Technical Tips To Not Be A Headline”. Here […]

Best Password Manager: Keep Your Accounts Safe

Password managers are quickly becoming a necessary tool for browsing the internet. At Cloudwards.net, we take security and privacy seriously. We’re here today for one reason: to pick from our password manager reviews the best option to secure your online accounts. The massive list ahead will give all the gritty details on why we like each password […]

WHY YOU SHOULD CONSIDER A SECURITY CERTIFICATION (AND WHY NOW IS THE TIME)

This post was originally published here by (ISC)² Management . Let’s face it: Opportunity goes to the well-prepared. And living in dangerous and dynamic times, each of us needs to be so much better prepared to face tomorrow than we were today. We’re all at risk. Everything we value, everyone we hold dear are held hostage […]

Security features on Google Cloud Platform (GCP)

Google, which happens to be one of the largest tech companies in the world after Amazon has for years warding off security threats by following certain guidelines in its day to day operations. In the last weekend, the internet juggernaut decided to disclose some security features of its Google Cloud Platform to help customers show […]

Guardians of the Cloud: The Latest Security Findings

This post was originally published here by  Juan Lugo . With the emergence of cloud adoption and BYOD in the workplace, companies are experiencing an overwhelming amount of data breaches. This is largely because they are not taking the appropriate steps to secure data in the cloud. As such, Bitglass conducted a survey with IT professionals […]

Bitglass Security Spotlight: EA Origin Leaves the Data of 300 Million Accounts Exposed

This post was originally published here by  Will Houcheime. Here are the top cybersecurity stories of recent weeks:  EA origin leaves the data of 300 million accounts exposed Health insurance marketing website leaks information of 5 million people Data breach impacts cloud solution provider, PCM Inc. Silexbot malware targets IoT devices Orvibo leaks customer data […]

2019 SECURITY CONGRESS – THE AGENDA IS LIVE!

This post was originally published here by (ISC)² Management. You’ve been curious. You’ve waited patiently. And now you’ll know exactly which sessions you can look forward to at our ninth annual Security Congress in Orlando! The full agenda for this conference is now online for you to browse and you won’t want to miss this year’s event. Security […]

THE CHALLENGES OF RAISING USER SECURITY AWARENESS

This post was originally published here by (ISC)² Management. One of the toughest challenges of cybersecurity is to raise awareness among users. Technology solutions are instrumental in achieving a solid security posture, but they only get you so far. There’s always the risk a user will make a split-second bad decision and open the door […]

Share this page