Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Cloud Security and Compliance: A Smarter Approach to Keeping Your Head Above Water

When it comes to cloud security and compliance, it’s easy to feel like you’re drowning in a sea of regulations and requirements. But don’t worry; we’re all in the same boat! That’s why we’re thrilled to share our latest point-of-view (POV) paper, “Practical Cloud Security in the Era of Cybersecurity Regulation,” which is crafted with our deep industry expertise and experience.

How to stay ahead of AWS Lambda costs

Severless is excellent, right? Faster development and less infrastructure hassle – but those AWS Lambda costs can sneak up on you. Over 70% of AWS customers are using serverless now. Seems like everyone’s jumping on the serverless bandwagon – and for good reason. It speeds up development and cuts down on the nitty-gritty infrastructure stuff. All this is a developer’s dream in a lot of ways.

Enhancing AWS Security: Comprehensive Strategies for Robust Cyber Protection

With the rapid expansion of cloud computing, Amazon Web Services (AWS) has become a cornerstone for businesses seeking scalable and flexible IT solutions. However, this increased reliance on AWS has made it a prime target for cyber threats. Ensuring robust security measures within AWS environments is paramount to safeguarding sensitive data and maintaining business continuity.

UniSuper's $125 Billion Cloud Catastrophe: Google's Accidental Deletion Reinforced the Importance of Backup Solution

The recent data loss incident involving UniSuper, a major financial player and Google Cloud serves as a reminder of the importance of implementing robust backup and disaster recovery solutions. Let’s delve into the details of the incident and explore why backups are essential for safeguarding against data disasters.

Google Cloud affected by CVE-2021-30476

CVE-2021-30476 affects HashiCorp's Terraform Vault Provider and involves incorrect configuration of bound labels for GCP (Google Cloud Platform) authentication. This issue permits unauthorized users to potentially bypass authentication mechanisms. The vulnerability stems from the Vault provider not correctly configuring the bound labels within the GCP authentication method, which could lead to improper access control.

An Offensive Security Perspective on Hacking the Cloud: Five AWS and Azure Cloud Security Threats to Focus On

According to Gartner, the global market for cloud infrastructure services increased by 30% in 2022, exceeding $100 billion for the first time. AWS and Azure account for almost two-thirds of this figure. While many organizations benefit from these platforms, the popularity of the cloud can also present significant security challenges.

What is Privilege Escalation in AWS? Recommendations to Prevent the Risk of Privilege Escalation on AWS

Privilege escalation in AWS refers to the unauthorized elevation of user privileges within the AWS environment, allowing users to access resources and perform actions beyond their intended level of permissions. This security risk would arise in case the attackers utilize the vulnerabilities or misconfigurations in AWS services, IAM policies, or access controls to take up privileges above the current level.

Hey, You. Get Off of My Cloud

The Rolling Stones wanted to protect their space; we, as security practitioners, need to protect ours. Data 'castles' in the cloud are out there, and they're constantly under siege. By drawing inspiration from a band that embodied personal freedom, we can draw some – okay, very stretched - parallels to modern cloud security. Nonetheless, they work. And we all knew this blog was coming. And if you read the blog backward you can hear the name of the latest malware family... Maybe.