Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why misconfigurations continue to plague public cloud network services and how to avoid them

Cloud security as a strategy is constantly evolving to meet the needs of organizations for scale, agility, and security. If your organization is weighing the merits of the use of public cloud versus private cloud, here are a few facts to keep in mind.

Attackers Continue to Abuse Google Sites and Microsoft Azure to Host Cryptocurrency Phishing

On August 9, 2022, we released a blog post about a phishing campaign where attackers were abusing Google Sites and Microsoft Azure Web Apps to steal cryptocurrency wallets and accounts from different targets, namely Coinbase, MetaMask, Kraken, and Gemini. The attackers were abusing SEO techniques to spread the pages and using advanced techniques to steal data, such as using live chats to interact with victims.

FedRAMP: The journey to cloud secure operations

For many years, the U.S. government was hesitant about moving data and applications to the public cloud. Concerns around security were prevalent. Today, cloud has become a central proposition of IT spend in government institutions. With the government urging federal agencies to move to the cloud for its agility, scalability, and cost efficiency, those agencies need access to FedRAMP®-authorized vendors.

Sysdig CSPM remediates security issues in seconds

Automate security issue fixes in seconds and reduce cloud risk with Sysdig. Let's dig in! We know cloud teams have tons of security issues. You can be spending hours trying to understand if those findings pose a real risk in your cloud environment. So, how can you shorten the time needed to triage every misconfiguration and take action on those that really matter to you? Discover how Sysdig aggregates security findings by root cause and prioritizes remediation based on impact and risk.

Strong Authentication Considerations for Digital, Cloud-First Businesses

Authentication as a baseline security control is essential for organizations to know who and what is accessing corporate resources and assets. The Cybersecurity and Infrastructure Security Agency (CISA) states that authentication is the process of verifying that a user’s identity is genuine.

Announcing the 2022 State of Cloud Security report from Snyk

Cloud computing has created the most profound shift in information technology in recent memory. Leveraging cloud technology, companies can build, deploy, and scale their applications faster than ever. But the adoption of cloud native tools and processes also brings new security challenges. Between complex cloud infrastructure and the expansion of cloud-based services, malicious actors have access to a bigger attack surface than they did even a few years ago.

Highlighting New Advanced Security Capabilities for Netskope Cloud Firewall

One of the benefits of a secure access service edge (SASE) framework is that organizations can dramatically simplify the implementation of security services without having to go through constant network redesigns and appliance operating system updates.