Remove cloud-security aws-s3-breaches-what-to-do-why
article thumbnail

The Biggest Threat to Cloud Security in 2021

SecureWorld News

There is no question, really, that the year 2020 was the biggest year ever for the cloud. You can make the argument then, that cloud security is more crucial than its ever been. This is why I reached out to Mark Nunnikhoven, Vice President of Cloud Research at Trend Micro, to discuss this topic.

article thumbnail

Q&A: Cloud Providers and Leaky Servers

Thales Cloud Protection & Licensing

The nonprofit GDI Foundation has tracked close to 175,000 examples of misconfigured software and services on the cloud this year. As more and more organizations are moving to the cloud, the number of leaky servers is increasing. Q: Why have there been so many leaky servers recently? Is this problem unique to Amazon?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is a cyberattack? Why knowing adversary tactics helps prepare for threats

BH Consulting

So while the risk remains, what can we do about it? This blog is the first in a series where I will cover what a cyberattack involves, outline how it’s carried out, and explain how it might differ depending on your chosen technology platform. and ‘How would I deal with it?’. Prepare to attack.

Risk 52
article thumbnail

The Hacker Mind Podcast: Incident Response in the Cloud

ForAllSecure

Incident response in the cloud. How is it different, and why do we need to pay more attention to it today, before something major happens tomorrow. There’s been a major data breach, and you’re booked on the next night flight out, at 6am. How can investigators go back and figure out what happened and when?

article thumbnail

The State of Cloud and Cloud Security in 2020

SecureWorld News

Not everyone would describe cloud security as "very exciting," however, the four expert panelists who joined us on our series of SecureWorld Remote Sessions for a Q&A hour all certainly shared this sentiment. The panelists spoke on cloud migration, the state of the cloud during the pandemic, the DevOps pipeline, and more.

article thumbnail

SW Labs | Overview: Attack Surface Management

SC Magazine

Though the term Attack Surface Monitoring (ASM) doesn’t specifically refer to external threats, that’s what this market currently focuses on. The aim of this report is to share what we’ve learned about the attack surface management space. If we’re not aware of Shadow IT or abandoned cloud projects, they won’t be included.

article thumbnail

Doxing in the corporate sector

SecureList

Introduction. Doxing refers to the collection of confidential information about a person without their consent for the purpose of inflicting harm on that person or to otherwise gain some benefit from gathering or disclosing such information. But this probably would be an expensive undertaking. We will discuss those methods in this article.