The Top 12 Hybrid Cloud Security Threats

Using a multiple-cloud architecture calls for a hybrid cloud security mindset, which tends to focus less on network security in favor of securing data wherever it may be. RightScale’s “2017 State of the Cloud” survey describes hybrid cloud as the preferred enterprise strategy, with 67 percent of the respondents using it. The interesting trend is that..

The post The Top 12 Hybrid Cloud Security Threats appeared first on Security Boulevard.

Continue reading The Top 12 Hybrid Cloud Security Threats

DoJ’s Irresponsible ‘Responsible’ Encryption

On Oct. 8, 2017, David Patterson, Sr. died on a reservation in New Mexico. Patterson was one of the last surviving World War II “Navajo code talkers” employed by the government because of the unique method of communication which, to the outside world, was undecipherable. Communications of the Navajo, even if intercepted, could not be..

The post DoJ’s Irresponsible ‘Responsible’ Encryption appeared first on Security Boulevard.

Continue reading DoJ’s Irresponsible ‘Responsible’ Encryption

DevOps Connect: DevSecOps Days Coming to RSAC

For the fourth year DevOps.com and now Security Boulevard are proud to be producing DevOps Connect: DevSecOps Days @ RSA Conference. The event will be held Monday, April 16, 2018. RSAC is the world’s largest security conference and so the perfect place to hold what we think of as the best day of DevSecOps. You..

The post DevOps Connect: DevSecOps Days Coming to RSAC appeared first on Security Boulevard.

Continue reading DevOps Connect: DevSecOps Days Coming to RSAC

Fancy Bear Adopts New DDE Attack Against Microsoft Office

Russian cyberespionage group Fancy Bear is using a recently publicized technique that abuses a legitimate Microsoft Office feature to create documents that can install malware. For the past several years the most common method of embedding malicious co… Continue reading Fancy Bear Adopts New DDE Attack Against Microsoft Office

AC/DC Act: Good in Theory, Terrible in Practice

Earlier this month, Georgia Congressman Tom Price introduced H.R. 4036, the Active Cyber Defense Certainty Act (AC/DC Act). The legislation would permit certain “victims” of cyberattacks to engage in certain types of “active defense” or “hack back” free from both civil and criminal liability under the Computer Fraud and Abuse Act. It would also empower..

The post AC/DC Act: Good in Theory, Terrible in Practice appeared first on Security Boulevard.

Continue reading AC/DC Act: Good in Theory, Terrible in Practice

SecBlvd Chats: Aqua Security Seeks to Lock Down Container Security

The migration to container-based application infrastructure is accelerating at a faster pace even than we saw with hypervisor-based infrastructure 18 or so years ago. Hand in hand with this is the race to provide better security solutions that are native to—and purpose-built for—containerized environments. Aqua Security is one such company doing that. It has established..

The post SecBlvd Chats: Aqua Security Seeks to Lock Down Container Security appeared first on Security Boulevard.

Continue reading SecBlvd Chats: Aqua Security Seeks to Lock Down Container Security

Russia: An Expert in Active Measures, Including Cyber Meddling

Russia, neatly tucked away in the rather large northeast corner of Europe and Asia with its 11 time zones, is the bastion of a most colorful political history. Since time immemorial there has always been underlying efforts to adjust perception, foment … Continue reading Russia: An Expert in Active Measures, Including Cyber Meddling

Hezbollah Amplifies Message Through Savvy Use of Media

Hezbollah, the “Party of Allah” (aka Party of God) recognized as a Shi’a Islamist political party and militant group based in Lebanon, has repeatedly demonstrated its mastery of the use of media and social networks to shape public opinion and grow sympathetic followers. Even recently the group has placed its operatives within Israel to regularity..

The post Hezbollah Amplifies Message Through Savvy Use of Media appeared first on Security Boulevard.

Continue reading Hezbollah Amplifies Message Through Savvy Use of Media

Supreme Court to Decide Major Internet Privacy and Jurisdiction Case

We love the cloud. We store our documents there. Our e-mails travel through cloud or other third-party providers. Now the U.S. Supreme Court is poised to decide whether the physical location of both the communications or documents themselves, or the lo… Continue reading Supreme Court to Decide Major Internet Privacy and Jurisdiction Case

Kaspersky Says Its Hand Was in the Cookie Jar, But …

Kaspersky Lab has been bombarded with an unending stream of claims that its Russian roots equate to being part of the Russian national team when it comes to national security interests. We previously discussed the rationale behind the ban of Kaspersky Lab security products in any U.S. government device, and how the company is believed..

The post Kaspersky Says Its Hand Was in the Cookie Jar, But … appeared first on Security Boulevard.

Continue reading Kaspersky Says Its Hand Was in the Cookie Jar, But …