Securing the Cloud
Orgs Still Struggling With Cloud Security
A dozen years ago, when organizations were still in the early stages of adopting cloud computing, the biggest obstacle was security. SMBs especially didn’t seem to understand what the cloud was, and ...
Automation is the Top Cloud Security Priority
Two years of pandemic-forced remote work has shown how much organizations depend on cloud computing. Employees want to work at home, convinced they are more productive from a remote office than at ...
Lapsus$ Strikes Again—190GB Samsung Data Release by Nvidia Hackers
Samsung Electronics has confidential data stolen and leaked by ransomware scrotes—190 GB of it ...
Revealed: Daxin—‘China-Linked’ Advanced Stealth Backdoor
Researchers unveil espionage malware from China: Daxin “is without doubt the most advanced piece of malware” they’ve seen from that country ...
Shifting Cloud Security Left
What is shift left security? The concept of shifting left comes from the four stages of the software development life cycle (SDLC): Develop, build, test and deploy. Developers are at the far ...
How Critical Infrastructure Providers Can Securely Connect OT to the Cloud
Cloud connectivity offers tremendous benefits for critical infrastructure operators. Sending data from operational technology (OT) devices to the cloud opens the door for asset owners to use remote diagnostic and analysis tools, ...
Multi-Cloud Security in 2022
As we kick off 2022, it is a good time to think about what the next year will mean for the security industry. This next year is a critical time for our ...
Crypto Mining Hackers vs. Cloud Computing—Google States the Obvious
Google’s new Cybersecurity Action Team (CAT) would like you to know that insecure cloud instances can be hijacked by hackers. Stop the press. Did we really need to be told that? ...
A Cyber Executive Order For the 21st Century
The long-expected Executive Order On Improving the Nation’s Cybersecurity was published Wednesday, May 12, 2021. My initial reaction is positive. It calls for using multifactor authentication and encryption within Federal agencies after ...