Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

May 2022

Building a More Secure Cloud: 5 Strategies for 2022

Cloud adoption continues to soar. More than two-thirds of small to mid-sized businesses intend to increase their use of cloud technologies over the next few years. While the cloud comes with many security benefits, it also carries unique concerns. As the cloud becomes increasingly central to business operations, cloud security should be a priority. Businesses must ensure this security from the ground up, not add it in later as an afterthought.

How to Protect Your Emails: 8 Best Gmail Account Security Tips

Have you ever had your Gmail account hacked? If not, you’re lucky. But it happens, 1 out of 4200 emails sent in 2020 was a phishing activity. Considering that 306 billion emails were sent in the same year, it means a whopping 72 million were phishing-related. Keeping your Gmail secure isn’t a request anymore. You don’t want anyone to access your personal information or compromise important company conversations and files.

Cybersecurity Measures Every Project Manager Should Know About

Online projects could be easy prey for cybercriminals due to the involvement of critical security information (emails, different platforms' login passwords, bank accounts, etc.) and multiple people. A simple phishing email requesting new login credentials or bank account details could be effective on negligent team members and could put everybody at risk. In other words, any breach of information by a project team member could lead to a disaster for the parties involved.

How to access AWS Console using AWS IAM

This blog post explores the traditional authentication and authorization processes to AWS Management Console, and how Teleport can replace them to further secure and audit your Infrastructure Access for AWS. You can access your AWS Management Console through a variety of methods. If a user has AWS Administrator or Root Access, they can see and edit all infrastructure in its entirety. AWS has multiple tools available to mitigate access, but are they enough?

What is SaaS Cloud Security and What Are SaaS Security Best Practices?

Software-as-a-service or SaaS has taken the business world by storm. With enormous benefits and features, it is no surprise that the SaaS industry has increased by 500% over the past seven years only. However, like any other technology, it carries a significant risk of data breaches. Do you know that encryption worries are the biggest SaaS-related security concerns for businesses?

Stronger Cybersecurity, Thanks to the New Rubrik Security Cloud

Sad fact: cyberattacks continue to grow in volume and sophistication. Plus, ransomware doesn't hit like a bomb–it’s often more like a Trojan Horse, where many organizations don't realize they are under attack until it's too late. Despite investments in infrastructure security tools deployed at the endpoint, perimeter, and network, bad actors are still getting through to hold data for ransom.

NC Protect is now available in both Microsoft Azure Marketplace and Azure Government Marketplace!

We are excited to share that NC Protect for Microsoft 365 is now available in both Microsoft Azure Marketplace and Azure Government Marketplace! archTIS customers can now take advantage of the productive and trusted Azure cloud platform, with streamlined procurement, deployment and management of NC Protect for M365 from the Marketplaces.

How to Configure Single Sign-On (SSO) for Amazon RDS Access

This blog is part two of a series about identity-aware access for Amazon RDS. In Part I, we covered how to use OSS Teleport to access Amazon RDS instances running in private subnets. In Part II, we will guide you through the steps to configure single sign-On (SSO) for Amazon RDS with Okta, SAML and Teleport.

Lookout Accelerates Zero Trust Journey for Ivanti Customers With SSE

To keep pace with the demands of a digital-first economy, organizations are accelerating cloud adoption and expanding work-from-anywhere initiatives. But as operations become more efficient, security teams struggle to keep pace. Existing solutions are not built to scale and can’t provide seamless access that safeguards data, which now reside in countless applications on premises and in the cloud.

Mobile App Security & Google's Data Safety Launch - Yay or Nay?

Internet and software giant Google recently recalibrated how it categorizes its Playstore apps. Google's Android applications are tagged with 'nutrition labels' based on the security practices and the data they collect from users to share with third parties. The recently announced Google Play's Data Safety section goes into action from July 20th.

Monitoring AWS networks at scale

Corelight is pleased to announce our integration with AWS’s Traffic Mirroring to Gateway Load Balancer (GWLB) Endpoint as a Target. This integration simplifies the monitoring of network traffic and generating Corelight data in massively scaled-out public cloud environments. When it comes to monitoring network traffic today, we see two primary deployment patterns, each with their own pain points.

Identity-Based Data Security on AWS

Speakers: Dave Cole, CEO of Open Raven Ev Kontsevoy, CEO of @Teleport Modern data drives business value. But the speed with which it is created and accessed across a global AWS footprint increases risk considerably. The old ways of securing data – VPNs, shared credentials stored in a secure vault, offsite backups – are no longer sufficient and don't work at cloud-scale. Join Teleport CEO Ev Kontsevoy and Open Raven CEO Dave Cole as they present a practical view of modern data security in two parts.

Learn how to automate secure cloud application provisioning

The cloud offers agility and speed for DevOps teams. Being able to spin up environments and create applications in a fraction of the time previously required helps organizations launch new capabilities for customers, employees, and vendors quickly. For most companies, this means reduced time to market and the ability to recognize revenue faster.

The main security challenges when adopting cloud services

The popularity of cloud services has increased exponentially in recent years. The prospects of saving on capital and operational expenditures have been significant driving forces in influencing companies to adopt cloud services. Scalability and elasticity are also key drivers that encourage companies to move to the cloud. However, moving to the cloud comes with a lot of challenges. Security is a big concern for organizations that want to migrate to the cloud.

How to Secure Amazon RDS Access With an Identity-Aware Access Proxy

Databases are sensitive resources that need an additional layer of protection and security. Though database servers have built-in authentication and authorization mechanisms, they are not designed for cloud-based, multi-tenant access mechanisms. Managed databases such as Amazon RDS are accessed and administered by different personas with varying levels of access permissions.

ONUG Spring 2022 Session: Verify security posture in hybrid multi-cloud environments

In an era when hybrid multi-cloud environments are the norm, extending the carefully architected network security policies is virtually impossible because IT teams cannot visualize their multi-cloud estate or monitor traffic behavior past the point of egress. Piecing together the cloud security posture requires combining data from multiple siloed applications.

7 Important Things to Include in Your Company Security Policy

We live in risky times. Security incidents and data breaches are more common than ever and digital-minded companies usually bear the brunt of it. Organizations are constantly at risk and can be compromised in no time by ransomware, cyberattacks, social engineering, and corporate espionage. But, in truth, the most common way companies are undermined and infiltrated is through the actions of individual members inside of the organization itself.

Hunting AWS RDS Security Events with Sysdig

The AWS RDS service itself falls on the AWS side of the Shared Responsibility model, but the day-to-day management of the RDS security instances falls on your side. When it comes to shared responsibility, your obligation depends on the AWS services that you deploy, and also other factors including (but not limited to) the sensitivity of your data, your company’s requirements, and applicable laws and regulations.

Stop Cloud Breaches with CrowdStrike promotional ad

With the growth of cloud, and the need for speed and agility in today’s digital business, you need a solution that goes beyond simply detecting threats, leaving you with all the work. Powered by holistic intelligence, CrowdStrike Cloud Security delivers great visibility, CI/CD security, and the industry's fastest threat detection and response to outsmart the adversary.
Sponsored Post

What Is CSPM? A Closer Look at Cloud Security Posture Management

As we previously discussed in the Automating Your Cloud Security Posture Management (CSPM) Response blog post, CSPM is a vital component in any environment leveraging cloud services. Whether you are using a single cloud or are in a multi-cloud scenario, the complexity of these cloud platforms is constantly expanding. Staying on top of new changes in policies and functionality to ensure that you are maintaining a secure environment is daunting - and almost impossible to do without automation. No one has the resources to spend on maintaining a large team of cloud specialists who just audit everything that is in use.

SSH configuration: ssh_config

This blog post covers some of my favorite settings for configuring the behavior of an ssh client (i.e. what is in the man pages for ssh_config). Whether you are looking to add some additional security constraints, minimize failures, or prevent carpal tunnel, ssh_config is an often underutilized, yet powerful tool. While the examples in this article focus on ssh configurations on unix based systems like linux and macOS, running an ssh server on windows is supported using openSSH.

AWS Targeted by a Package Backfill Attack

On April 28 and April 30, respectively, WhiteSource Diffend identified, blocked, and reported two packages we deemed were malicious versions of original Amazon Web Services (AWS) packages. Whitesource security experts have reached out to contacts at Amazon to notify them of our findings. This discovery may point to a new takeover method that targets packages of well-known origins, in this case, AWS.