article thumbnail

RSAC insights: Introducing ‘CWPP’ and ‘CSPM,’ new frameworks to secure cloud infrastructure

The Last Watchdog

Related: How credential stuffing fuels account takeovers. In pulling off that milestone hack, Paige Thompson took advantage of CapOne’s lack of focus on cloud security as the banking giant rushed headlong into leveraging Amazon Web Services. Here are the key takeaways: Cloud migration risks.

article thumbnail

Q&A: Sophos poll shows how attackers are taking advantage of cloud migration to wreak havoc

The Last Watchdog

Cloud migration, obviously, is here to stay. But there’s no doubt that the exodus to a much greater dependency on hybrid cloud and multi-cloud resources – Infrastructure-as-a-Service ( IaaS ) and Platforms-as-a-Service ( PaaS ) – is in full swing.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

In this role, Diane is accountable for the security of the retail stores, cyber-security, infrastructure, security/network engineering, data protection, third-party risk assessments, Directory Services, SOX & PCI compliance, application security, security awareness and Identity Management. Director/CISO of IT Risk Management.

article thumbnail

Group-IB uncovers PerSwaysion – sophisticated phishing campaign targeting executives worldwide

Security Affairs

ybercriminals behind the PerSwaysion campaign gained access to many confidential corporate MS Office365 emails of mainly financial service companies, law firms, and real estate groups. New round of phishing attempts leveraging current victim’s account usually takes less than 24 hours. Gone in 24 Hours.

Phishing 101
article thumbnail

How Banks Can Enhance Security of Office 365 and G Suite

Spinone

How can today’s financial institutions keep pace with today’s business demands and still maintain an ultra-secure security stance? Financial data is perhaps one of the most sensitive types of data. Often, the target of attackers can be financial information or other information that can compromise identity.

Banking 40
article thumbnail

How better key management can close cloud security gaps troubling US government

Thales Cloud Protection & Licensing

The report puts the onus on CSPs to “increase employee engagement experts, and to improve supportive technological tools and adoption frameworks that can help ensure that financial service firms design and maintain resilient, secure platforms for their customers.” This hack included US Government networks.

article thumbnail

How better key management can close cloud security gaps troubling US government

Security Boulevard

The report puts the onus on CSPs to “increase employee engagement experts, and to improve supportive technological tools and adoption frameworks that can help ensure that financial service firms design and maintain resilient, secure platforms for their customers.” This hack included US Government networks.