Cloud security uncertainty: Do you know where your data is?

How well are security leaders sleeping at night? According to a recent Gigamon report, it appears that many cyber professionals are restless and worried. In the report, 50% of IT and security leaders surveyed lack confidence in knowing where their most sensitive data is stored and how it’s secured. Meanwhile, another 56% of respondents say […]

The post Cloud security uncertainty: Do you know where your data is? appeared first on Security Intelligence.

Continue reading Cloud security uncertainty: Do you know where your data is?

Why Are Cloud Misconfigurations Still a Major Issue?

Cloud misconfigurations are by far the biggest threat to cloud security, according to the National Security Agency (NSA). The 2022 IBM Security X-Force Cloud Threat Landscape Report found that cloud vulnerabilities have grown a whopping 28% since last year, with a 200% increase in cloud accounts offered on the dark web in the same timeframe.  […]

The post Why Are Cloud Misconfigurations Still a Major Issue? appeared first on Security Intelligence.

Continue reading Why Are Cloud Misconfigurations Still a Major Issue?

Securing Cloud Technology in a Growing Threat Landscape

Cloud technologies are becoming more and more popular. Many companies shifted their workloads and their IT infrastructures into the cloud. The advantages are clear: more flexibility and scalability, less admin overhead and often cost savings. But with those advantages also come many risks. Recent studies have shown several threats cloud technologies face. As data transfers […]

The post Securing Cloud Technology in a Growing Threat Landscape appeared first on Security Intelligence.

Continue reading Securing Cloud Technology in a Growing Threat Landscape

One Small Error by DevOps, One Giant Opening for Attackers

When you look at breach statistics in today’s cloud-dominated IT world, you can see several examples where a small error made by the DevOps or CloudOps team has led to a tremendous impact on businesses’ reputations or, in some cases, their existence. Misconfigured AWS S3 buckets, poor password management on publicly exposed databases and secrets […]

The post One Small Error by DevOps, One Giant Opening for Attackers appeared first on Security Intelligence.

Continue reading One Small Error by DevOps, One Giant Opening for Attackers

One Small Error by DevOps, One Giant Opening for Attackers

When you look at breach statistics in today’s cloud-dominated IT world, you can see several examples where a small error made by the DevOps or CloudOps team has led to a tremendous impact on businesses’ reputations or, in some cases, their existence. Misconfigured AWS S3 buckets, poor password management on publicly exposed databases and secrets […]

The post One Small Error by DevOps, One Giant Opening for Attackers appeared first on Security Intelligence.

Continue reading One Small Error by DevOps, One Giant Opening for Attackers

Cloud Security Trends: What Is Cybersecurity Mesh?

Have you heard of cybersecurity mesh? Some are calling it one of the more notable trends for cloud security and today’s other cyber concerns. So, what is it, and how does it work? The technology stack is breaking down as more people use architectures based on microservices. They’re also using blockchain and other trust models […]

The post Cloud Security Trends: What Is Cybersecurity Mesh? appeared first on Security Intelligence.

Continue reading Cloud Security Trends: What Is Cybersecurity Mesh?