Securing the Cloud
Orgs Still Struggling With Cloud Security
A dozen years ago, when organizations were still in the early stages of adopting cloud computing, the biggest obstacle was security. SMBs especially didn’t seem to understand what the cloud was, and ...
Security Boulevard
Automation is the Top Cloud Security Priority
Two years of pandemic-forced remote work has shown how much organizations depend on cloud computing. Employees want to work at home, convinced they are more productive from a remote office than at ...
Security Boulevard
Lapsus$ Strikes Again—190GB Samsung Data Release by Nvidia Hackers
Richi Jennings | | code leak, Home Chef data leak, Lapsus$, private key, Ransomware, Samsung, SB Blogwatch, Sell your Samsmug phone and never buy another one
Samsung Electronics has confidential data stolen and leaked by ransomware scrotes—190 GB of it ...
Security Boulevard
Revealed: Daxin—‘China-Linked’ Advanced Stealth Backdoor
Richi Jennings | | backdoor, Backdoor.Daxin, china, Daxin, People are stupid to run Windows, SB Blogwatch
Researchers unveil espionage malware from China: Daxin “is without doubt the most advanced piece of malware” they’ve seen from that country ...
Security Boulevard
Shifting Cloud Security Left
What is shift left security? The concept of shifting left comes from the four stages of the software development life cycle (SDLC): Develop, build, test and deploy. Developers are at the far ...
Security Boulevard
How Critical Infrastructure Providers Can Securely Connect OT to the Cloud
Cloud connectivity offers tremendous benefits for critical infrastructure operators. Sending data from operational technology (OT) devices to the cloud opens the door for asset owners to use remote diagnostic and analysis tools, ...
Security Boulevard
Multi-Cloud Security in 2022
As we kick off 2022, it is a good time to think about what the next year will mean for the security industry. This next year is a critical time for our ...
Security Boulevard
Crypto Mining Hackers vs. Cloud Computing—Google States the Obvious
Richi Jennings | | Crypto, cryptocurrency, GOOG, GOOGL, google, Google are more likely to be included in the threat model than the solution space, imaginary money, SB Blogwatch
Google’s new Cybersecurity Action Team (CAT) would like you to know that insecure cloud instances can be hijacked by hackers. Stop the press. Did we really need to be told that? ...
Security Boulevard
A Cyber Executive Order For the 21st Century
The long-expected Executive Order On Improving the Nation’s Cybersecurity was published Wednesday, May 12, 2021. My initial reaction is positive. It calls for using multifactor authentication and encryption within Federal agencies after ...
Security Boulevard