Protecting Your Cloud Environments With Zero Trust
When moving to a cloud infrastructure, businesses should be looking toward a Zero Trust strategy. This security model protects the cloud from the inside...
Oxeye Contextualizes Cloud Native Application Risk Assessment — Investigates Application-Level Vulnerabilities
Oxeye has announced the availability of its Cloud Native Application Security Testing (CNAST) platform. The application security platform identifies custom code and open-source vulnerabilities,...
Despite its Challenges, Cloud Computing is Still the Way to Go
A recent “state of the cloud” report reveals interesting points that highlight the growing prominence of cloud computing. The report, which surveyed 753 technical...
The Evolution of Cloud Security Posture Management
Cloud security posture management or CSPM didn't exist a few years ago, yet it's something businesses are talking about now. This is happening because...
What is Cloud Security Posture Management?
Coined by Gartner, cloud security posture management solutions are making an impact mitigating misconfiguration in cloud infrastructure. Similar to other evolving and emerging cloud...
Protect Your WordPress sites with CrowdSec
The CrowdSec team is expanding the capabilities of their open source and free security solution by finalizing the release of its brand new application...
Cloud Security vs. Network Security: What’s the Difference?
Cloud security and network security fall under the security umbrellas that are used to protect the information of an organization, but each one of...
NSA Warns of Cloud Attacks on Authentication Mechanisms
The US National Security Agency (NSA) published a security advisory, warning about two techniques abused by threat actors for escalating attacks from local networks...
A Hacker’s Perspective: How Easy it is to Steal Data Through Consumer Cloud Services
As more people want to work from home, businesses discover the benefits associated with consumer cloud services. Things like easy access regardless of location,...
Hackers Would Bypass Multi-Factor Authentication to Gain Full Access to Microsoft 365 Services
Security researchers from Proofpoint discovered critical security vulnerabilities with multi-factor authentication (MFA) implementations in the cloud environment where the WS-Trust is enabled.
WS-Trust is a...