Cloud-native - Tagged - Security Boulevard The Home of the Security Bloggers Network Fri, 21 Jul 2023 12:29:26 +0000 en-US hourly 1 https://wordpress.org/?v=6.2.2 https://securityboulevard.com/wp-content/uploads/2021/10/android-chrome-256x256-1-32x32.png Cloud-native - Tagged - Security Boulevard 32 32 133346385 New P2P Worm Puts Windows and Linux Redis Servers in its Sights https://securityboulevard.com/2023/07/new-p2p-worm-puts-windows-and-linux-redis-servers-in-its-sights/ Thu, 20 Jul 2023 16:35:18 +0000 https://securityboulevard.com/?p=1982166 P2PInfect network security, phishing, ChatGPT, AI, identity, hacking, AI, Chat GPT, ChatGPT malware threat ransomware CNA REvil EtterSilent ransomware dark web

A new peer-to-peer (P2P) worm, P2PInfect, is spreading across instances of the Redis open source database software in the cloud.

The post New P2P Worm Puts Windows and Linux Redis Servers in its Sights appeared first on Security Boulevard.

]]>
1982166
Lacework Adds Custom Risk Scoring Capability to CNAPP https://securityboulevard.com/2023/04/lacework-adds-custom-risk-scoring-capability-to-cnapp/ Wed, 19 Apr 2023 13:00:11 +0000 https://securityboulevard.com/?p=1972345 Lacework cloud security fortinet Juniper strategy IAM Datadog CSA cloud security SMBs cloud

Lacework today announced it has added a risk vulnerability scoring capability to its cloud-native application protection platform (CNAPP) that can be customized to a specific cloud computing environment. Lacework also announced it has expanded its attack path analysis capabilities to add support for Kubernetes. Kate MacLean, senior director of product marketing for Lacework, said this..

The post Lacework Adds Custom Risk Scoring Capability to CNAPP appeared first on Security Boulevard.

]]>
1972345
Sysdig Details Proxyjacking Attack Leveraging Log4j Vulnerability https://securityboulevard.com/2023/04/sysdig-details-proxyjacking-attack-leveraging-log4j-vulnerability/ Tue, 04 Apr 2023 13:00:19 +0000 https://securityboulevard.com/?p=1970869 SD-WAN Sysdig Log4j open source cyberattack New Attack Vectors Cloud

Sysdig today published a report that described how cybercriminals are exploiting the Log4j vulnerability to gain access to IP addresses that are then sold to entities that resell them. Dubbed proxyjacking, the attacks enable cybercriminals to resell bandwidth to providers of proxyware services that allow someone to hide their physical location. Cybercriminals are using the..

The post Sysdig Details Proxyjacking Attack Leveraging Log4j Vulnerability appeared first on Security Boulevard.

]]>
1970869
5 Tips for Devnexus 2023 https://securityboulevard.com/2023/04/5-tips-for-devnexus-2023/ Tue, 04 Apr 2023 03:56:59 +0000 https://www.azul.com/?p=61636 Here are four tips for making the most of Devnexus 2023, based on my first-hand experience and conversations with other attendees.

The post 5 Tips for Devnexus 2023 appeared first on Azul | Better Java Performance, Superior Java Support.

The post 5 Tips for Devnexus 2023 appeared first on Security Boulevard.

]]>
1970844
Should You Choose Agentless or Agent-Based for CNAPP? https://securityboulevard.com/2023/03/should-you-choose-agentless-or-agent-based-for-cnapp/ Thu, 30 Mar 2023 14:00:54 +0000 https://securityboulevard.com/?p=1969866 Wiz multi-cloud, security, CNAPP cloud computing cybersecurity Orca Kubernetes TDIR cloud and container security

It’s the current great debate among DevOps teams: Which cloud-native application protection platform (CNAPP) approach is best-suited to protect your cloud environments? Is an agent-based or agentless approach the ideal strategy? Cloud environments and their security needs are becoming more dynamic and complex due to modern applications featuring mixed workloads, multi-cloud environments and different runtimes...

The post Should You Choose Agentless or Agent-Based for CNAPP? appeared first on Security Boulevard.

]]>
1969866
How Credential Misuse Threatens Cloud Operations https://securityboulevard.com/2023/01/how-credential-misuse-threatens-cloud-operations/ Thu, 12 Jan 2023 14:00:08 +0000 https://securityboulevard.com/?p=1955981 converged, identity Permiso PAM, cybersecurity, credentials, identity, security, credentials authorization PAM governance digital identity IAM authorization

Cloud-native security is a rapidly evolving section of the industry reacting to the increasing threats unique to organizations that are exclusively or primarily operating on cloud applications and platforms. In a report last year, Gartner named identity system defense as a top trend in cybersecurity for 2022. The list of cybersecurity trends pointed to the..

The post How Credential Misuse Threatens Cloud Operations appeared first on Security Boulevard.

]]>
1955981
Predict 2023: Stand and Deliver https://securityboulevard.com/2023/01/predict-2023-stand-and-deliver/ Tue, 10 Jan 2023 19:07:03 +0000 https://securityboulevard.com/?p=1951875 Predict

It’s that time of year again—the New Year’s ritual: Time to predict the big trends in your world for the new year. By now you have probably seen dozens of headlines, articles, videos and interviews telling you what big trends will shape the coming year. Here at Techstrong Group, our Predict virtual event is built..

The post Predict 2023: Stand and Deliver appeared first on Security Boulevard.

]]>
1951875
API Protection and Cloud-native Application Protection Platforms (CNAPP) https://securityboulevard.com/2022/11/api-protection-and-cloud-native-application-protection-platforms-cnapp-2/ Tue, 15 Nov 2022 17:00:07 +0000 https://www.cequence.ai/?p=11622 Security Solutions for APIs and Cloud Applications Organizations have gained many benefits by developing applications in the cloud that include flexibility, agility, scalability, and speed – but it’s also created security problems that are not easily solved by just any one solution. These problems become more complicated when considering APIs, which are the glue that […]

The post API Protection and Cloud-native Application Protection Platforms (CNAPP) appeared first on Cequence Security.

The post API Protection and Cloud-native Application Protection Platforms (CNAPP) appeared first on Security Boulevard.

]]>
1946312
API Protection and Cloud-native Application Protection Platforms (CNAPP) https://securityboulevard.com/2022/11/api-protection-and-cloud-native-application-protection-platforms-cnapp/ Tue, 15 Nov 2022 17:00:06 +0000 https://www.cequence.ai/?p=11621 Security Solutions for APIs and Cloud Applications Organizations have gained many benefits by developing applications in the cloud that include flexibility, agility, scalability, and speed – but it’s also created security problems that are not easily solved by just any one solution. These problems become more complicated when considering APIs, which are the glue that […]

The post API Protection and Cloud-native Application Protection Platforms (CNAPP) appeared first on Cequence Security.

The post API Protection and Cloud-native Application Protection Platforms (CNAPP) appeared first on Security Boulevard.

]]>
1945790
January Software Release – Kicking off the New Year https://securityboulevard.com/2022/02/january-software-release-kicking-off-the-new-year/ Wed, 16 Feb 2022 01:00:35 +0000 https://www.traceable.ai/?p=32718 It’s January and we kicking off the new year with a new set of features aimed at improving application security for our customers. Traceable AI has released a range of new features and deployment options with the continued aim to help our customers to have the best API security solution on the market.

The post January Software Release – Kicking off the New Year appeared first on Traceable App & API Security.

The post January Software Release – Kicking off the New Year appeared first on Security Boulevard.

]]>
1911962