Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

October 2024

Identify the secrets that make your cloud environment more vulnerable to an attack

Compromised secrets, such as leaked API and SSH keys, credentials, and session tokens, are the leading cause of cloud security incidents. While attackers can directly compromise secrets through methods like phishing, they can also gain control by finding and taking advantage of simple misconfigurations in your environment.

Prevention Cloud: Protecting Your Data from Malware and Other Threats

It is more important than ever to keep your info safe. Malware, ransomware, and cybercriminals who target cloud-based assets are always a danger to businesses because more and more sensitive data is being stored in the cloud. Cybersecurity Ventures recently released a report that says the costs of cybercrime will hit $10.5 trillion per year by 2025. Data breaches and cloud vulnerabilities will be the main causes of this.

Identity is the Perimeter of the Cloud

93% of last year’s data breaches began with compromised credentials. Before the cloud, security perimeters were defined by physical walls and network boundaries, but in the cloud, that perimeter has all but dissolved. Consider what happened in November 2023, when a cloud observability vendor found evidence of unauthorized access to its staging environment — an environment that housed customer data and PII.

Why IT Leaders Need DEM to Drive Success in the Hybrid Cloud Era

In today’s rapidly evolving digital landscape, IT leaders, whether CIOs, CISOs, or VPs of IT, are responsible for driving a range of initiatives that enable business growth and success. Projects like cloud migration, hybrid workforce enablement, and SaaS adoption are now essential. However, these initiatives carry inherent risks that need to be carefully managed, especially when it comes to performance, security, and user experience.

Why SIEM Is Not Right for SaaS Security

When security information and event management (SIEM) tools came to the market over a decade ago, many practitioners considered the combination of information management and event management groundbreaking. Since then, the technology has gone through iterations to improve and enhance its capabilities, including the incorporation of user and entity behavior analytics (UEBA), machine learning and AI capabilities, and “out-of-the-box” configurations for smaller organizations to rely on.

Forward Networks Wins Mobile Breakthrough Awards' Enterprise Cloud Computing Software of the Year for the Fifth Consecutive Year

Mobile Breakthrough Awards has named Forward Networks the winner of its “2024 Enterprise Cloud Computing Software of the Year” award. This is Forward Networks’ fifth consecutive award win for Enterprise Cloud Computing from Mobile Breakthrough’s Award program.

From Detection to Remediation: Securing Cloud Data with Lookout

Cloud storage in SaaS apps has become an indispensable tool for organizations of all sizes, with as much as 60% of corporate data now residing in the cloud. However, the convenience of cloud storage comes with the risk of data leaks, which can have devastating consequences. While cloud storage allows for easy data sharing and collaboration, it also opens up potential vulnerabilities that must be addressed.

Cloud Alphabet Soup Examining CSPM, DSPM, KSPM, and CNAPP

Cloud native applications are dominating the tech landscape for modern enterprises. A garden-variety cloud native application consists of microservices deployed in containers orchestrated with Kubernetes, and these microservices interact together via APIs. Netflix, Salesforce, and Atlassian products like Jira and Confluence are all common examples of cloud native applications.

Asia-based SMBs: leverage logs to enhance cloud security and scale your operations

As small and mid-sized businesses (SMBs) across Asia adopt cloud technologies to accelerate growth, securing your cloud infrastructure becomes a significant challenge. The complexities of managing cloud environments, regulatory compliance, and ensuring real-time threat detection require robust solutions that are both scalable and cost-effective.

How Parking Technology Enhances Cybersecurity

Parking lots are a staple of our daily routines - whether we're shopping, working, or visiting. This is where we spend considerable amounts of time surrounded by cars and people. Given the high foot traffic and density of vehicles, enhancing the safety and security of these spaces is crucial for businesses looking to create a secure and enjoyable experience for their customers. Here, technology plays a pivotal role in supporting this endeavor, offering solutions that enhance safety, privacy, and cybersecurity.

Introducing Access for Infrastructure: SSH

BastionZero joined Cloudflare in May 2024. We are thrilled to announce Access for Infrastructure as BastionZero’s native integration into our SASE platform, Cloudflare One. Access for Infrastructure will enable organizations to apply Zero Trust controls in front of their servers, databases, network devices, Kubernetes clusters, and more. Today, we’re announcing short-lived SSH access as the first available feature.

Training a million models per day to save customers of all sizes from DDoS attacks

Our always-on DDoS protection runs inside every server across our global network. It constantly analyzes incoming traffic, looking for signals associated with previously identified DDoS attacks. We dynamically create fingerprints to flag malicious traffic, which is dropped when detected in high enough volume — so it never reaches its destination — keeping customer websites online. In many cases, flagging bad traffic can be straightforward.

Alternative to Apple Cloud Storage: Finding the Best Option for Privacy

Last year, Apple sold 234.6 million iPhones, knocking Samsung off the top spot as the most-sold mobile device since 2010. Each Apple device sold has a default Apple cloud storage plan, iCloud, which offers 5GB of free storage as standard for iPhones, iPads, Macbooks, and iMacs. As Apple's default cloud storage, many may wonder if it is right for them based on needs such as file sharing, backups, accessibility, storage size, security, and privacy.

What is UPnP? And Why is it Still a Security Risk?

In this video, learn what UPnP is, what it does, use cases, why it's a security risk, and security measures you can take. Learn more about: Resources and social media: Transcript: Universal Plug and Play, or UPnP, is a way for all devices on a local network to discover and connect with each other automatically, rather than having to connect each device by manually entering protocols like TCP/IP, HTTP, or DHCP.

Key learnings from the 2024 State of Cloud Security study

We’ve just released the 2024 State of Cloud Security study, where we analyzed the security posture of thousands of organizations using AWS, Azure, and Google Cloud. In particular, we found that: In this post, we provide key recommendations based on these findings, and we explain how you can use Datadog Cloud Security Management (CSM) to improve your security posture.

DLP 101: How to Prevent Data Exfiltration in the Cloud

These days, your organization's data is its most valuable asset. But what happens when that data slips through your fingers? Picture this: It's Friday afternoon, and your security team receives an alert about an unusual number of downloads from your cloud storage app, Google Drive. As you investigate, you realize it's corporate IP that's being downloaded en masse by a departing employee. This type of exfiltration incident isn't just hypothetical; it's a reality that organizations face on the daily.

Designing a Comprehensive IT Strategy for Scalability and Security

In digitized business environments, resilient IT strategies empower organizations to innovate fearlessly through sustained agility and threat countermeasures, scaling operations seamlessly. Yet fragmented foundations invite catchup turmoil reactively behind market dynamics, securing continuity and trust sub-optimally.

Azure DevOps Backup Best Practices

Having a market share of 8.81 % and competing with other version control platforms, like GitHub, Bitbucket, and GitLab, Azure DevOps can already boast of more than 700M Azure users. That’s not surprising, as the service offers a variety of things from planning to development and operations. Thus, containing critical DevOps information, Azure DevOps becomes a critical hub of your data. So, in this case, is the question “Why back up Azure DevOps” the correct one?

How to Keep Your Data Safe in the Cloud with the Best Backup Software

When it comes to file storage, it's not just a case of storing your files in the cloud and the job’s done. You have to take more steps to protect against data loss, corruption, accidental deletion, or ransomware. Whenever you store anything, it is essential to back up your files for complete reassurance that no matter what happens to your device, you will always have a backed-up version of your files that you can recover.

Protect against identity-based attacks by sharing Cloudflare user risk scores with Okta

Cloudflare One, our secure access service edge (SASE) platform, is introducing a new integration with Okta, the identity and access management (IAM) vendor, to share risk indicators in real-time and simplify how organizations can dynamically manage their security posture in response to changes across their environments.

GitProtect 1.8.5 release brings a big launch - Azure DevOps Backup and DR

We are so proud to announce that GitProtect Backup and Disaster Recovery for Azure DevOps is here! The 1.8.5 release also brings a few improvements – performance, UX, and more – and small fixes. Let’s dig into more details.

What are patent trolls? How Cloudflare defeating Sable made patents public!

In this week’s episode, we look at patent trolls, what they are, and why a recent Cloudflare win also helps the industry to innovate. Host João Tomé is joined by Emily Terrell, Senior Legal Counsel, Litigation, and Patrick Nemeroff, Senior Director, Legal Counsel. We discuss how Cloudflare was sued by the patent troll Sable but emerged victorious. Sable was ordered to pay Cloudflare $225,000 and grant a royalty-free license to its entire patent portfolio.

S3 Storage For DevOps Backups

Choosing S3 storage like AWS, Google Cloud, or Azure Blob Storage is a strategic choice. Especially as data volumes grow fast and disaster recovery strategies require more focus. Such an investment may reduce operational overhead and optimize costs. Then, new technical and economic perspectives follow. 99% of IT decision-makers state they have a backup strategy. And yet, 26% of them couldn’t fully restore their data when recovering from backups (according to a survey of Apricorn from 2022).

Cloud Security Assessment: Checklist to Ensure Data Protection

The adoption of cloud computing has become a cornerstone of modern business operations today. However, this shift brings forth significant concerns about data protection and security. Cloud security assessment plays a crucial role in safeguarding sensitive information and ensuring compliance with industry regulations. Organizations must prioritize this process to identify vulnerabilities, mitigate risks, and establish robust security measures within their cloud environments.

Cloudflare acquires Kivera to add simple, preventive cloud security to Cloudflare One

We’re excited to announce that Kivera, a cloud security, data protection, and compliance company, has joined Cloudflare. This acquisition extends our SASE portfolio to incorporate inline cloud app controls, empowering Cloudflare One customers with preventative security controls for all their cloud services.

What is Cloud Security? Best Practices, Challenges

Cloud security refers to the comprehensive set of measures and technologies designed to protect data, applications, and infrastructure within cloud environments. As more businesses migrate to cloud platforms, safeguarding these environments becomes critical. The shift to cloud brings efficiency, scalability, and cost-effectiveness, but given the rising trends of cyber-attacks, it also introduces new security challenges that must be addressed to ensure sensitive data remains protected.

What Are Hardware and Software Keyloggers? How Can You Spot and Prevent Them?

In this video, learn what hardware and software keyloggers are, signs you may have one, how to prevent them, and more. Learn more about: Resources and social media: Transcript: Do you remember every key you pressed on your laptop today? Every word you typed in an email? Every password you punched in? Every digit you entered for your credit card? For you and me, recalling all that information is next to impossible. But not for a Keylogger.

Enhance your website's security with Cloudflare's free security.txt generator

Meet Georgia, a diligent website administrator at a growing e-commerce company. Every day, Georgia juggles multiple tasks, from managing server uptime to ensuring customer data security. One morning, Georgia receives an email from a security researcher who discovered a potential vulnerability on the website. The researcher struggled to find the right contact information, leading to delays in reporting the issue.

The Essential Role of CIEM: Stopping Multi-Cloud Identity-based Threats

Enterprises are increasingly adopting multi-cloud environments to take advantage of the flexibility and scalability of different cloud platforms. However, this shift has also introduced a major security challenge: the rise of identity-based threats. With 82% of data breaches now involving cloud-stored data, securing cloud identities has become a critical need. The complexity of managing identities and permissions across multiple cloud platforms only amplifies the risks.

Embargo Ransomware Expands Attacks to Cloud Environments

Ransomware continues to evolve, and the latest escalation in tactics comes from the Embargo ransomware group. Threat actor Storm-0501, known for its previous ties to various ransomware groups, has now shifted its focus towards hybrid cloud environments, targeting both on-premise and cloud-based systems. This strategic shift poses significant risks for organizations relying on cloud infrastructure, particularly those in critical sectors such as healthcare, government, transportation, and law enforcement.

AWS Launches Improvements for Key Quarantine Policy

Recently, AWS expanded the scope of their AWSCompromisedKeyQuarantine policies (v2 and v3) to include new actions. This policy is used by AWS to lock down access keys that they suspect have been compromised. A common example of this process in action is when AWS automatically applies the quarantine policy to any keys found by scanning public GitHub repositories. This proactive protection mechanism can stop compromises before they happen.
Featured Post

Is the Speed of AI Development Leaving UK SMEs Struggling to Plug Security Gaps?

Artificial Intelligence (AI) is perhaps one of the fastest evolving technologies in business today. For SMEs, it can be hard to keep up with these developments and sift through what's simply noise, and what will deliver tangible business benefits. As the UK data from our recent SME IT Trends report shows, embracing AI can help UK SMEs streamline operations, improve the admin and user experience, and stand out in a crowded marketplace. Without a doubt, choosing to ignore AI would be choosing to fall behind.

What Is ARM64 and Why Should You Use It?

In this video, learn what ARM64 is, its architecture, its advantages over x86 and other processors, and other general benefits. Resources and social media: Transcript: If you’re wondering what ARM64 is, let’s flash back a few years… During the 2000s, ARM processors led the way in the mobile revolution, providing our smartphones and tablets with serious computing power. ARM’s 32-bit chips were built on reduced instruction set computer (RISC) architecture that clocked speeds of 1 to 2 GHz, and became the dominant chip inside the devices we put in our pockets.

How to Add Azure Account as a Datasource

In this BDRSuite demo, I’ll guide you through adding an Azure Account as a Data Source in BDRSuite Backup Server.` BDRSuite provides robust protection for your Azure data, allowing you to back up and recover virtual machines, storage accounts, and other Azure resources efficiently. It supports flexible storage options, secure backups, and easy recovery processes.

How Cloudflare auto-mitigated world record 3.8 Tbps DDoS attack

Since early September, Cloudflare's DDoS protection systems have been combating a month-long campaign of hyper-volumetric L3/4 DDoS attacks. Cloudflare’s defenses mitigated over one hundred hyper-volumetric L3/4 DDoS attacks throughout the month, with many exceeding 2 billion packets per second (Bpps) and 3 terabits per second (Tbps). The largest attack peaked 3.8 Tbps — the largest ever disclosed publicly by any organization. Detection and mitigation was fully autonomous.

CrowdStrike Empowers DevSecOps Teams to Strengthen and Streamline Cloud Security

Support for cloud security posture management (CSPM) misconfigurations: Our enhanced CSPM tools vigilantly monitor cloud infrastructures for misconfigurations, compliance violation and security gaps, providing complete visibility into security posture early in the development cycle and saving SecOps teams time.

Opti9 Receives AWS Resilience Competency

As of Monday, September 16th, Opti9 Technologies is proud to have achieved the AWS Resilience Competency, specialized in Resilience Recovery, recognizing our expertise in helping customers enhance the availability and reliability of their critical cloud workloads. As an AWS Resilience Competency Partner, our services are rigorously validated by AWS to ensure we meet the highest standards as an AWS Services Partner, and uphold the established expertise.

Birthday Week 2024 Recap: AI Audit, Speed Brain, Developer Tools and more!

In this week’s episode, we recap our main innovation week of the year, Birthday Week, and its many announcements. Host João Tomé is joined by Brendan Irvine-Broque (Group Product Manager) and Kelly May Johnston (Director, Product Management). We dive into some of the key announcements of the week, including the AI audit and major improvements in security, performance, and AI/ML support, such as enhanced threat detection and analytics, faster navigation with Speed Brain, and expanded free tools for all users.

Unlocking the Power of Secure Identities with Identity-as-a-Service (IDaaS)

As businesses continue to embrace cloud services for scalability and cost efficiency, cybersecurity is following a similar trend. To stay ahead of evolving threats, companies are increasingly adopting Identity-as-a-Service (IDaaS) as a comprehensive solution. Leveraging cutting-edge technologies, Managed Service Providers (MSPs) deliver Identity Security to help businesses achieve key objectives.

The importance of CSPM inventory

Almost all organizations either rely on cloud computing or are planning to adopt cloud computing technologies soon to ensure their businesses remain competitive and gain an edge over the competition. As businesses increasingly rely on cloud services to manage their operations, the complexity of these environments continues to grow, introducing new challenges in maintaining security and compliance. This is where Cloud Security Posture Management (CSPM) comes into the picture.

Secure Cloud Access with Wiz & CyberArk: Enhance Multi-Cloud Security at Cloud Speed | CyberArk

Discover how the powerful integration between Wiz and CyberArk enhances cloud security by identifying and controlling excessive cloud privileges. In this demo, you'll see how Wiz flags risky access, while CyberArk applies just-in-time privileged access for secure administrative operations in multi-cloud environments. By leveraging the principle of least-privilege, CyberArk's Secure Cloud Access ensures all sessions are monitored for compliance and audit without slowing down your cloud development.