Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing DevOps : Security in the Cloud

Key Topics surface possible for a startup, to focus on their product and leave complex infrastructure security and cloud security problems for later on.
  • The need to start segmenting permissions when there are too many people in a team is a natural, and getting into the cloud services and cloud security business knowing that rearchitecting regularly will be needed is healthy.
  • Appknox adds ioXt Security Compliance Testing for IoT & Mobile Apps

    Appknox, a leading enterprise mobile application security solution provider has announced a partnership with ioXt, a global standard for IoT security and standardization of security, privacy, and compliance programs. With the alliance, Appknox will enforce the clients with a Security Pledge that focuses on the security of stakeholders, and devices in the IoT environment.

    Is Google Drive HIPAA Compliant?

    Google Drive is one of the oldest and most well known cloud storage and productivity suites. Although Google Drive launched in 2012, Google’s productivity platform dates back to 2006, when Google Docs and Google Sheets first launched. Over the years, Google would more closely integrate these services before moving them under the Google Drive and Google Suite brand. Today, Google Drive and Google’s entire suite of collaborative tools are referred to as Google Workspace.

    The Right Steps to SASE: Refactor Internal Data Center Controls to Closed Loop Risk Management

    The following is an excerpt from Netskope’s recent book Designing a SASE Architecture for Dummies. This is the sixth in a series of seven posts detailing a set of incremental steps for implementing a well-functioning SASE architecture. Throughout this series, we repeat that the data center is just one more place people and data have to go—it’s no longer the center of attention.

    Netskope CTE and CrowdStrike Demo

    Together, Netskope and CrowdStrike deliver a comprehensive view of threats across web, cloud, and endpoints and work together to respond more quickly and effectively to those threats. By sharing threat intelligence and investigation artifacts Netskope and CrowdStrike can ensure newly discovered threats are quickly identified, endpoints protected, and the threat neutralized across the organization. Additionally, Netskope is able to identify those endpoint devices that are secured by CrowdStrike and granularly control cloud access and activities of any endpoints where the CrowdStrike agent is not installed.

    Lookout and NTT DOCOMO Partner to Deliver Security from Device to Identity

    Tablets and mobile devices have become an essential part of our daily lives, especially as 5G expands and remote work continues. This means these devices hold some of the most sensitive information that is tied to our digital identity. Today, I’m excited to share that we have expanded our consumer partnership with NTT DOCOMO to include identity monitoring and protection for DOCOMO’s subscribers across Android and iOS devices.

    Teleport has been named a Cool Vendor in Gartner's Identity-First Security report

    Today we are happy to announce that Teleport has been included as a Cool Vendor in Gartner Cool Vendors in Identity-First Security report. “We believe Teleport’s inclusion in the Identity-First Security Report by Gartner is confirmation that Teleport solves a huge problem of accessing cloud-native resources that traditional PAM tools did not,” said Ev Kontsevoy, co-founder and CEO of Teleport.

    Cloud Threats Memo: Beware of Leaky Buckets and Cloud Apps

    Another memo, another leaky cloud app compromising the personal information of hundreds of thousands of individuals (and yes, you can easily guess the app that exposed the data so no spoiler alert needed—it was an S3 bucket). The latest organization to join the long list of victims of cloud misconfigurations is Cosmolog Kozmetik, a popular Turkish online retailer that exposed more than 9,500 files, totaling nearly 20 GB of data.

    5 Top Tips for Cloud Security from Enterprise CISOs

    The Financial Times hosted an excellent event recently, at which I joined Naina Bhattacharya, CISO for Danone; Manish Chandela, Group CISO for Unipart and Florence Mottay, Global CISO for Ahold Delhaize, to discuss cloud security. The FT’s Dan Thomas moderated and the panellists all shared some excellent and candid insights into cloud threats and security strategies within their organisations.