Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

September 2022

How to Mitigate Risks When Your Data is Scattered Across Clouds

Cloud applications have opened up limitless opportunities for most organizations. They make it easier for people to collaborate and stay productive, and require a lot less maintenance to deploy, which means they’re much more affordable and easy to scale to your needs. But for all of their benefits, cloud apps also open up your organization to a host of new risks. By enabling users anywhere access to corporate resources you lose the visibility and control that perimeter-based tools provide.

How Your Healthcare Organization Can Achieve Cloud Cybersecurity and Compliance

Healthcare leaders are embracing cloud technologies to connect information across the continuum of care, engage more patients, and unlock the potential of health data. While the cloud streamlines healthcare operations, it also presents challenges for organizations that must meet the stringent data security requirements of HIPAA and other security standards.

Strengthen Your SaaS Security with SaaS Ops

Many organizations have multi-cloud setups, with the average corporation employing services from at least five cloud providers. Compatibility problems, contract breaches, non-secured APIs, and misconfigurations are among the security hazards cloud computing brings, which is popular. SaaS configurations are an attractive target for cybercriminals because they store a large amount of sensitive data, such as payment card details and personal information.

How To Secure Your Files for Back to School? Cybersecurity Tips for Students

While online learning provides many positive opportunities for learners and teachers alike, it is more important than ever to strengthen cybersecurity defenses to deal with new and emerging attacks. As school is back in session, now is a good time to double-check that you’re doing everything necessary to keep your data (and your homework) secure online.

Snyk IaC for Terraform Enterprise: Expanding Snyk compatibility with HashiCorp Terraform

Even the most precise and regimented DevOps teams can be plagued by numerous post-deployment security issues, causing potentially damaging production delays and engineering rework. Building on Snyk’s successful acceleration of DevSecOps, Snyk IaC empowers developers to treat Terraform like any other form of code and proactively test IaC early as well as continuously monitor infrastructure post-deployment.

How to meet 24 Google Cloud Platform (GCP) security best practices using open source

You’ve got a problem to solve and turned to Google Cloud Platform and follow GCP security best practices to build and host your solution. You create your account and are all set to brew some coffee and sit down at your workstation to architect, code, build, and deploy. Except… you aren’t. There are many knobs you must tweak and practices to put into action if you want your solution to be operative, secure, reliable, performant, and cost effective.

Cloud Insecurities - How to threat hunt in hybrid and multi cloud environments

Amidst a record number of workloads moving to the cloud – security teams must not only confront the cyber-skills shortage, but also a general lack of cloud expertise. Corelight and guest Forrester will share best practices for building threat detection, hunting, and incident response capabilities to the cloud and upskilling your existing SecOps team. Watch this on demand webcast to learn.

Top Five Reasons To Use CloudCasa With Azure

CloudCasa by Catalogic announced the integration with Azure Kubernetes Service (AKS) at KubeCon in Valencia and it has so far received positive feedback from customers. In this episode of TFiR Let’s Talk, Swapnil Bhartiya sits down with Sathya Sankaran, Founder and General Manager, CloudCasa by Catalogic and Sebastian Głąb, CloudCasa Architect, as they give a demo and explain the key reasons to use CloudCasa to protect AKS Applications.

How to create a Tines Tunnel with an AWS EC2 instance

Today's business world is more complex than ever, and many companies are reliant on private networks to keep their data safe and secure. But what happens when you need to access data from a remote location or connect to multiple separate private environments? In this guide, we'll show you how to create a Tines Tunnel so you can route traffic from Tines to a private API/network successfully. Read on for step-by-step instructions.

NAA Creating Dashboard Filters

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data. The Netskope Intelligent Security Service Edge (SSE) platform is fast, easy to use, and secures people, devices, and data anywhere they go. Netskope helps customers reduce risk, accelerate performance, and get unrivaled visibility into any cloud, web, and private application activity. Thousands of customers, including more than 25 of the Fortune 100, trust Netskope and its powerful NewEdge network to address evolving threats, new risks, technology shifts, organizational and network changes, and new regulatory requirements.

7 Best Encrypted Email Services to Protect Yourself With In 2022

Most successful hacks and data breaches are perpetrated through email. In a perfect world, everyone would find safer methods for communication, but since email isn't going anywhere anytime soon, encrypted email is our best option. Since Internxt doesn't have its own encrypted email yet, we've assembled a list of the best encrypted email services you should use in the meantime.

Best practices for securely configuring Amazon VPC

Amazon Virtual Private Cloud (Amazon VPC) is an AWS service that enables you to launch AWS resources within your own virtual network. Because you can deploy VPCs in separate regions and other VPC components themselves are deployable across different Availability Zones, VPC-hosted environments tend to be highly available and more secure.

Container Image Scanning for Azure Pipelines with Sysdig

Scanning a container image for vulnerabilities or bad practices in your Azure Pipelines using Sysdig Secure is a straightforward process. This article demonstrates a step by step example on how to do it. The following proof of content showcased how to leverage the sysdig-cli-scanner in Azure Pipelines. Although possible, it is not officially supported by Sysdig, so we recommend checking the documentation to adapt these steps to your environment.

Threat news: TeamTNT targeting misconfigured kubelet

TeamTNT is a prevalent threat actor who has been targeting cloud and virtual environments such as Kubernetes and Docker since at least late 2019. This threat actor is financially motivated, focusing their efforts on stealing credentials and cryptomining. In 2020, we analyzed their use of Weave Scope on an unsecured Docker API endpoint exposed to the internet. In December 2021, we attributed an attack to TeamTNT in which they targeted a vulnerable WordPress pod to steal AWS credentials.

Why misconfigurations continue to plague public cloud network services and how to avoid them

Cloud security as a strategy is constantly evolving to meet the needs of organizations for scale, agility, and security. If your organization is weighing the merits of the use of public cloud versus private cloud, here are a few facts to keep in mind.

Attackers Continue to Abuse Google Sites and Microsoft Azure to Host Cryptocurrency Phishing

On August 9, 2022, we released a blog post about a phishing campaign where attackers were abusing Google Sites and Microsoft Azure Web Apps to steal cryptocurrency wallets and accounts from different targets, namely Coinbase, MetaMask, Kraken, and Gemini. The attackers were abusing SEO techniques to spread the pages and using advanced techniques to steal data, such as using live chats to interact with victims.

6 best practices to stay secure in the hybrid cloud

Every year we witness more organizations of all sizes investing more in the cloud. A recent report by the Cloud Security Alliance and AlgoSec shows that over half of organizations are running 41% or more of their workload in the public cloud, and 62% of organizations are running multi-cloud environments. With organizations running workloads in complex hybrid networks - public, private, and on-premises networks - the security landscape is getting even more complex. There are actions you can take, though, to help you dissolve the complexities.

FedRAMP: The journey to cloud secure operations

For many years, the U.S. government was hesitant about moving data and applications to the public cloud. Concerns around security were prevalent. Today, cloud has become a central proposition of IT spend in government institutions. With the government urging federal agencies to move to the cloud for its agility, scalability, and cost efficiency, those agencies need access to FedRAMP®-authorized vendors.

Sysdig CSPM remediates security issues in seconds

Automate security issue fixes in seconds and reduce cloud risk with Sysdig. Let's dig in! We know cloud teams have tons of security issues. You can be spending hours trying to understand if those findings pose a real risk in your cloud environment. So, how can you shorten the time needed to triage every misconfiguration and take action on those that really matter to you? Discover how Sysdig aggregates security findings by root cause and prioritizes remediation based on impact and risk.

Strong Authentication Considerations for Digital, Cloud-First Businesses

Authentication as a baseline security control is essential for organizations to know who and what is accessing corporate resources and assets. The Cybersecurity and Infrastructure Security Agency (CISA) states that authentication is the process of verifying that a user’s identity is genuine.

Announcing the 2022 State of Cloud Security report from Snyk

Cloud computing has created the most profound shift in information technology in recent memory. Leveraging cloud technology, companies can build, deploy, and scale their applications faster than ever. But the adoption of cloud native tools and processes also brings new security challenges. Between complex cloud infrastructure and the expansion of cloud-based services, malicious actors have access to a bigger attack surface than they did even a few years ago.

Highlighting New Advanced Security Capabilities for Netskope Cloud Firewall

One of the benefits of a secure access service edge (SASE) framework is that organizations can dramatically simplify the implementation of security services without having to go through constant network redesigns and appliance operating system updates.

What's new in Calico Cloud: General availability of new container security features

Summer is almost over but we are bringing the heat back with the official release of Tigera’s new container security features. With this official launch, Calico leads the industry by offering a complete line of solutions across every stage of a cloud-native application CI/CD pipeline.

5 Reasons Why Marketing Teams Should Use Secure Cloud Storage

The cloud has a lot going for it, and one of the most significant advantages it has brought to the table is data storage. For businesses, this surplus of cheap and scalable cloud storage combined with the many new innovations in cloud computing has the potential to boost productivity, reduce expenses, and simplify operations. In the marketing industry, cloud computing already benefits companies of all sizes.

7 Key Benefits of a Reliable Cloud Application Security Partner

When you’re looking to secure your applications, you need to keep a few things in mind. You want to make sure that your software security vendor is a fully-Saas vendor you access in the cloud. That way you benefit from scalability, peer benchmarking, and more. Here’s what to look for in an application security testing solution that you can access in the cloud while supporting cloud-native development. Plus, you’ll learn why cloud-based trumps on-premises solutions.

What are Elastic Security capabilities in the cloud - and how do they drive results?

Cloud-based SIEM, long a forward-looking topic, is here and now. In fact, advanced organizations will spend 27% more on cloud cybersecurity as a percentage of IT spending in 2022 vs. 2021 as they expand their use of cloud providers, services, and integrations with other technologies. There are a myriad of benefits to conducting security operations on a cloud-based platform.

Taking a Look at Security Issues with Open Storage Buckets

Now that we’ve explored the familiar form of SaaS file sharing, let’s compare it to the very different ways that storage objects in IaaS/PaaS clouds are shared (e.g., Amazon S3 buckets, Azure blobs, Google Cloud storage). All of these objects begin with a much more controlled default. Only the owner of the object has access—the opposite of the starting point for SaaS.

How can healthcare reinvent itself in the Cloud to prevent cyber threats?

Technological advances in the healthcare sector have led to increased interconnectivity and Cloud-based infrastructures in order to maintain physical distance due to COVID-19 and address the urgent need to deal with overwhelming patient volumes through online care. According to data from Global Markets Insights, the healthcare Cloud computing market was valued at over $29 billion in 2020 and is expected to be worth $79.3 billion by 2027, with a CAGR of 13.4%.

Addressing the Invisible Security Problem of Open File Shares

According to a recent survey from the Cloud Security Alliance, cloud issues and misconfigurations remain the leading causes of breaches and outages—and 58% of respondents report concerns about security in the cloud. Their worries are well-founded. Nearly every day, we see examples of a company’s sensitive data spilling out of leaky clouds.

How Netskope Intelligent SSE and Aruba Secure SD-WAN Integrate for SASE Success

At Netskope, our primary focus in the marketplace is to help customers protect their data. More and more data exists outside the traditional enterprise perimeter and is growing at an ever-rapid pace. More than 80% of users are using personal apps and instances from managed devices, and of those applications being accessed, roughly half would be given a “Poor” risk rating by the Netskope Cloud Confidence Index.

Why Your Cloud Migration Is Causing Security Risk

You've migrated to the cloud, which has made you more efficient and agile. But this comes with new security challenges. Your data is outside your corporate network: In public clouds, on personal devices, on unsanctioned apps, and handled by networks you don't own. The more spread out your data is, the less visibility and control you have.

Implementing zero-trust workload security on Amazon EKS with Calico

Whether you’re migrating to the cloud via lift-and-shift deployments, or re-architecting to a cloud-native architecture, the migration itself and adopting a microservices architecture is no easy feat. To accelerate their cloud-native journey, many organizations opt for a managed Kubernetes service, as the skill and resources required to run a container orchestration system at scale are demanding.

Delivering More (Security) with Less (Overhead) Thanks to Netskope and Mandiant

For most companies, security and IT systems are growing in complexity, breadth of scope, and coverage, which consumes budget and staff time. The rapid breakdown of the traditional perimeter in this “new normal” world increases the challenges IT teams and remote users face on a daily basis.

The Developer's Essential Guide to Cloud Deployment Models

You’ll probably agree that there are barely any organizations left that don’t use some form of cloud computing in their daily operations. In fact, the cloud computing market is booming, with various sources expecting a worth of upwards of $600 billion within the next two years. And it makes sense: Cloud computing is the cheaper, scalable, easier-to-manage young cousin of yesteryear’s private server.