Security
Enhanced security and compliance for AWS
This post was originally published here by casey pechan. Navigating the Amazon Web Services (AWS) Shared Responsibility Model can be tricky, but nonetheless it’s critical to understand what security protections AWS provides and what security additions can be sourced in the AWS Marketplace. Hint: we’re in it! Our latest white paper, enhanced security and compliance for Amazon […]
Automated security remediation with CloudPassage Halo and Puppet
This post was originally published here by casey pechan. Those of you who follow our blogs or press releases know how much we love working with Puppet. Our API seamlessly integrates with Puppet’s offerings, meaning your security practices can be just as a rapid as your DevOps processes. And our latest video on automated security remediation […]
Deployment of 5G might not bolster IoT Security
Last year, US President Donald Trump announced that his government would like to nationalize the next generation 5G wireless networks in a bid to guard against competitive and Cybersecurity threats from nations like Russia, North Korea and from mainly China. The Federal Communications Commission of United States has also confirmed that the move will help […]
Saturday Security Spotlight: Walmart, Leaks, and Slingshot
This post was originally published here by Jacob Serpa . Here are the top cybersecurity stories of recent weeks: Walmart partner’s S3 misconfiguration exposes data of 1.3 million customers Misconfigured servers leak healthcare data Malicious cryptomining impacting businesses Slingshot malware begins its assault UK government increasing its use of AWS Walmart partner’s S3 misconfiguration exposes data […]
Care Analytics partner webinar: CloudPassage security and compliance
This post was originally published here by casey pechan. Not only is Care Analytics a valued partner of ours, but they provide excellent cloud computing for the healthcare industry. In their latest webinar: Featured partner, CloudPassage security and compliance, we sat down with some of their team to demo and discuss our platform CloudPassage Halo, which Care Analytics […]
THE FOCUS ON CYBER RISK: IS IT TIME TO STOP TALKING SECURITY?
This post was originally published here by (ISC)² Management . By Tamer Gamali, CISSP, CISO and member, (ISC)² EMEA Advisory Council As a Chief Information Security Officer (CISO) based in Dubai with 15 years working in financial services, and a member of (ISC)²’s EMEA Advisory Council I am keen to help companies develop a deeper understanding […]
Saturday Security Spotlight: Malware, AWS, and US Defense
This post was originally published here by Jacob Serpa. Here are the top cybersecurity stories of recent weeks: AndroRAT malware spies on Android users Smart TVs easily hackable BuckHacker tool finds unsecured data in AWS buckets Octoly breach exposes social media stars’ personal data Russian hackers target US defense contractors AndroRAT malware spies on Android […]
Who’s responsible for security in AWS?
This post was originally published here by carson sweet. One of the biggest questions to be answered as enterprises migrate to AWS is, who’s responsible for security? The AWS shared responsibility model for security is a must-read for security and compliance practitioners starting their AWS journey. AWS does provide quite a lot of security for their customers, […]
Intel Processors are suffering from a serious Chip Level Security Flaw
Intel Processors are said to be suffering from a serious chip-level security flaw which isn’t that easy to fix. And as per a post published in ‘The Register’, the fix must come from the OS level and when available could easily hit the overall performance of the processor. As per the report, the bug seems […]
Saturday Morning Security Spotlight: Jail Breaks and Cyberattacks
This post was originally published here by Jacob Serpa. Here are the top cybersecurity stories of recent weeks: Man attempts prison break through cyberattacks Mailsploit allows for perfect phishing attacks 1.4 billion credentials found in dark web database Starbucks WiFi hijacks connected devices Hackers target cryptocurrency employees for bitcoins Man attempts prison break through cyberattacks […]