Advocates urge Amazon to drop controversial DHS surveillance program

HART will become the one-stop shop for profiles that combine data from other DHS projects.

The post Advocates urge Amazon to drop controversial DHS surveillance program appeared first on CyberScoop.

Continue reading Advocates urge Amazon to drop controversial DHS surveillance program

Cloudflare not fully backing out of Russia, company says, as tech firms are forced to weigh in

Cloudflare, a major web infrastructure firm that keeps websites online by protecting them from distributed denial-of-service  attacks, said Monday that it will continue to provide some services within Russia despite several calls to pull out, stating that “Russia needs more Internet access, not less.” The statement is just the latest example of internet infrastructure firms having to explain how they are approaching business in Russia as that country’s government continues its brutal assault on Ukraine, and the government of Ukraine seeks to isolate Russia from the internet by publicly calling out major tech and web firms with business interests there. In a statement, Cloudflare CEO Matthew Prince said the company has seen a “dramatic increase in requests from Russian networks to worldwide media, reflecting a desire by ordinary Russian citizens to see world news beyond that provided within Russia.” The statement detailed the various steps the company has taken to […]

The post Cloudflare not fully backing out of Russia, company says, as tech firms are forced to weigh in appeared first on CyberScoop.

Continue reading Cloudflare not fully backing out of Russia, company says, as tech firms are forced to weigh in

Reducing the Risk of Credential Leakage

Long-term cloud credentials are often scattered throughout source code, on laptops or desktops, on servers, in cloud resources and in other locations. It’s easy to copy them across machines, creating credential sprawl that increases your leakage risk…. Continue reading Reducing the Risk of Credential Leakage

Amazon’s Sidewalk, a neighborhood device network, is ‘uncharted territory’ for data privacy, watchdogs say

A new Amazon feature aimed at keeping users’ home devices connected to the internet by using a friendly slice of neighborhood broadband is already raising concerns about unintended privacy consequences. Amazon’s Sidewalk network pulls slivers of broadband from its users to create a larger network to extend the range for devices further from a users’ home, such as the tracking device Tile or smart lighting at the edge of a users’ property. Benefits of such technology include helping a user find a lost dog or car keys, Amazon touts. It could also keep devices online if the internet of an individual user goes out. Concerns about the expansion of existing home devices’ reach draws on lingering anxieties about internet-connected home devices. Amazon, Google, and other major home security devices have all suffered significant hacks in recent years, while some have collected an alarming amount of users’ private data. Ring’s doorbell […]

The post Amazon’s Sidewalk, a neighborhood device network, is ‘uncharted territory’ for data privacy, watchdogs say appeared first on CyberScoop.

Continue reading Amazon’s Sidewalk, a neighborhood device network, is ‘uncharted territory’ for data privacy, watchdogs say

AWS IAM vs. AWS SSO: Choosing the Right Service

Learn the difference between AWS IAM and AWS SSO and which is better suited for your business. Try JumpCloud for Free!
The post AWS IAM vs. AWS SSO: Choosing the Right Service appeared first on JumpCloud.
The post AWS IAM vs. AWS SSO: Choosing the Righ… Continue reading AWS IAM vs. AWS SSO: Choosing the Right Service

Understanding and Preventing S3 Leaks

Amazon Simple Storage Service, or S3, is a popular service that many developers today rely on to quickly build applications. Over time, S3 has become a popular target for attackers, resulting in a large number of data leaks. Most of them, such as the … Continue reading Understanding and Preventing S3 Leaks

Senate hearing on SolarWinds hack lays bare US shortcomings, remaining mysteries

A host of federal government policy failures contributed to the rippling damage of the SolarWinds hack, leaders of cyber firms told a Senate panel on Tuesday, with even lawmakers saying Congress must do more to prevent a repeat. More than two months after the hack became public, the wide-ranging Senate Select Committee on Intelligence hearing committee demonstrated that the U.S. government, the private sector and digital incident responders still are wrestling with the ramifications of an suspected Russian espionage campaign that leveraged the federal contractor SolarWinds. A number of big questions remain: SolarWinds still hasn’t determined how the hackers originally got into its systems, nobody has fully settled debates on whether the incident amount to espionage, or something worse, and suspicions abound that more victims remain unrevealed. “It has become clear that there is much more to learn about this incident, its causes, its scope and scale, and where we […]

The post Senate hearing on SolarWinds hack lays bare US shortcomings, remaining mysteries appeared first on CyberScoop.

Continue reading Senate hearing on SolarWinds hack lays bare US shortcomings, remaining mysteries

ThreatStack Brings Security Observability to AWS EC2

ThreatStack announced this week that it has integrated its observability platform for tracking cybersecurity events with the EC2 cloud service from Amazon Web Services (AWS). Chris Ford, vice president of product for ThreatStack, said the company’s na… Continue reading ThreatStack Brings Security Observability to AWS EC2

Trend Micro Employs Serverless Computing to Scan Cloud Files for Malware

Trend Micro has developed an antimalware tool, based on a lightweight, serverless computing framework, that can scan files for malware before they are stored in cloud services. Cloud storage services have become a significant attack vector, as cybercr… Continue reading Trend Micro Employs Serverless Computing to Scan Cloud Files for Malware