article thumbnail

BrandPost: Protecting Cloud Assets in 5 Steps with Micro-Segmentation

CSO Magazine

Whether a company utilizes a private, hybrid or public cloud infrastructure or offers cloud services to others, it is critical that each cloud instance and service be isolated to help minimize the risk of data compromise. In a traditional network, networking equipment and firewalls segment and isolate physical servers and other devices.

Firewall 109
article thumbnail

NEW TECH: Data Theorem helps inventory sprawling APIs — as the first step to securing them

The Last Watchdog

That’s how they’re going to transfer data in, hopefully, a secure channel to pass information back and forth with each other.”. However, APIs are also more frequently the source of data breaches and other cyber incidents. No one really knows exactly how many APIs are out there. And that’s just one phone. Postal Service.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Brian Krebs is an independent investigative reporter known for his coverage of technology, malware , data breaches , and cybercrime developments. ICYMI, Equifax forced to pull offline a huge database of consumer data guarded only by credentials "admin/admin" [link] — briankrebs (@briankrebs) September 13, 2017.