Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

August 2022

Keeping your Kubernetes Backup Data Private with Azure Private Link

At CloudCasa, as a cloud-native backup-as-a-service provider, we are often dealing with customer concerns about the security and privacy of their data. Sometimes the concern is almost paradoxical because the data and application they are protecting is publicly accessible and running inside the public cloud. However, there are times when organizations use public cloud infrastructure with a network architecture that resembles a private cloud.

SaaS Applications Streamline Application Development and Exploitation

Software-as-a-Service (SaaS) applications are built on the premise of streamlining business practices to improve productivity. Microsoft 365, Salesforce, and similar SaaS platforms commonly integrate automation tools that allow business users to develop the tools that they need to do their jobs. The latest iteration of this is the integration of low-code/no-code platforms into these SaaS solutions.

Cloud Data Management Capabilities (CDMC) framework: the challenges & best practices

Cloud adoption has gained solid momentum over the past few years. The technology has been helping organizations revolutionize their businesses and optimize their processes for increased productivity, reduced cost, and better scalability. But as organizations pour their entire focus on improving their businesses, they tend to lose control of governance. One of the many reasons that data governance tends to get more out of control is when organizations increasingly adopt a hybrid or multi-cloud model.

Enhancing Security with AI/ML

Digital transformation has driven the rapid adoption of cloud-delivered services like SaaS/IaaS/PaaS in enterprises. This, in turn, has resulted in the migration of digital assets (aka data) from the confines of enterprise data centers to the cloud data centers that are not under the control of the enterprises. Additionally, the onset of the COVID-19 pandemic has resulted in remote work becoming the norm.

Securing Cloud Infrastructure with Teleport and AWS Identity Federation

Over the last decade, enterprises have accelerated the adoption of the cloud. According to the State of the Cloud report by Flexera, the average annual spend on cloud computing is over $62 million. As enterprises continue to invest in the cloud, AWS, the market leader in cloud computing, is growing at a rapid pace. The rise of cloud computing poses new challenges to enterprise IT. With each department migrating and managing their workloads in AWS, there is a proliferation of accounts, users and roles.

3 examples of organizations that could have benefited from a CASB

In recent times, the widespread use of cloud services has become common for most organizations. While many organizations now enjoy the savings and convenience afforded by hosting their data and services on cloud platforms, this shift towards the cloud brings with an increased vulnerability to data theft and cyberattacks.

Cross Account Replication of AWS RDS with Rubrik Security Cloud

The Relational Database Service (RDS) service offered by AWS is one of the most popular databases today. A lot of critical, confidential data resides inside of RDS. Hence it becomes imperative to protect this data from various threats and ensure that the data is secure. Our approach to protecting the data inside RDS is based on two aspects: Rubrik already supports a modern approach to safeguarding RDS data from an operational perspective and also maintains a clean, secure copy in a different region.

Improve Your Cloud Data Protection Through Protegrity's S3 AWS Marketplace Integrations

Protecting your data as it moves through data pools and warehouses is critical. Protegrity’s partnership and integrations with AWS allows corporations to improve continuous data flows with Protegrity Cloud Protect for S3.

Data Resilience for Microsoft Azure SQL Against Ransomware and Credential Compromise

In the event of a cyber attack, how confident are you that your Azure SQL data is safe and recoverable? As a commitment to cyber-proofing the cloud, we’re pleased to introduce new security enhancements to our previously-announced Azure SQL protection. Now, businesses and government agencies can further minimize the risk of data loss in Azure SQL databases and Managed Instances.

How to Comply with HECVAT in 2022

The Higher Education Community Vendor Assessment Toolkit (HECVAT) helps higher education mitigate the impact of security risks of vendor relationships offering cloud-based services. With supply chain attacks on the rise, and vendor risks ranking in the top three initial attack vectors for data breaches, HECVAT compliance is becoming a mandatory requirement for partnering with higher education institutions.

Blackhat 2022 recap - Trends and highlights

Blackhat 2022, on its 25th anniversary, took place this week in Las Vegas. The most important event for the infosec community and the best place for security vendors to showcase all their innovations and products in this ever-growing ecosystem. This year, attendees come from 111 different countries. In 2020, Black Hat added the word Cloud to the existing track about Platform Security.

How to reduce your exposure & secure your data in the cloud in 5 quick ways

More companies are switching from on-premises systems to public cloud services, ensuring long-term growth and digital resilience. But as their implementations grow, they begin to realize that their exposure to cyberattacks and other risks grows as well. Cybersecurity is an essential practice for successful businesses. Adapting to business growth is a good problem to have, but without an eye on cloud security, that growth could cost you in the long run.

Are cloud containers a sugar-coated threat?

Containerization is a rapidly evolving technology in cloud-native applications. Just like computing systems, containers consist of packages of software programs with all the vital elements like binaries, files, and libraries for running an application in the environment from anywhere. Containers are lightweight, and DevOps teams develop applications and deploy services using them. Moreover, organizations also use these containers to deploy and scale the DevOps infrastructure like the CI/CD tools.

Rubrik Ranked #31 on the 2022 Forbes Cloud 100

Rubrik is honored to again be named to the Forbes Cloud 100, the annual ranking of the top private cloud companies in the world. This list is comprised of some of the most respected and fastest-growing companies globally. We’re humbled to be alongside these innovative brands and to make this prestigious list for the sixth year in a row! As the pioneer in Zero Trust Data Security™, this recognition underscores Rubrik’s continued cybersecurity momentum.

Abusing Google Sites and Microsoft Azure for Crypto Phishing

Throughout 2022, Netskope Threat Labs found that attackers have been creating phishing pages in Google Sites and Microsoft Azure Web App to steal cryptocurrency wallets and accounts from Coinbase, MetaMask, Kraken, and Gemini. These phishing pages are linked from the comment sections of other websites, where the attacker adds multiple links to the phishing pages, likely to boost SEO and drive victims directly to these pages.

5 Common Cybersecurity Mistakes You Can Easily Prevent

A comprehensive organizational strategy and robust company security policy are crucial for effective cybersecurity. A company needs to make a concerted effort to design, execute, and follow through with a plan to deal with cyber-risk management from top to bottom. There is no one-size-fits-all strategy for the needs of enterprises in managing cyber risk. But in order to maintain strong system security in the face of constant threats, there are some core principles that every company should follow.

AWS re:Inforce 2022 recap

If you’re looking to catch up on what happened at this years AWS re:Inforce, this is the blog for you. There were many important announcements were this year, including some exciting updates on the cloud security front. In this post, we’ll quickly review the goals of the conference and who should attend, before diving into the keynote highlights, software updates, and helpful resources.

Why the Right Architecture is the Cornerstone of Cloud Security

Alan Hannan is a member of the Netskope Network Visionaries advisory group. The cloud often seems like a black box for many corporate networking and security professionals. They have expertise in optimizing their internal network. Still, once they offload their traffic to the cloud, they figure they’re handing off optimization to the software-as-a-service (SaaS) provider.

Ousaban: LATAM Banking Malware Abusing Cloud Services

Ousaban (a.k.a. Javali) is a banking malware that emerged between 2017 and 2018, with the primary goal of stealing sensitive data from financial institutions in Brazil. This malware is developed in Delphi and it comes from a stream of LATAM banking trojans sourced from Brazil, sharing similarities with other families like Guildma, Casbaneiro, and Grandoreiro.

Is Cybersecurity Hard? The Basics Made Easy To Understand

Being online means that we are constantly interacting with others and sharing information across borders. It also means that Google is tracking you. This virtual international travel creates countless opportunities for cybercriminals to access our personal data. If you dive into how the internet works and how to protect your privacy, you’ll start to hear the word cybersecurity a lot. But what is cybersecurity exactly? Is cybersecurity hard?