How an Attacker Can Achieve Persistence in Google Cloud Platform (GCP) with Cloud Shell

IBM Security X-Force Red took a deeper look at the Google Cloud Platform (GCP) and found a potential method an attacker could use to persist in GCP via the Google Cloud Shell. Google Cloud Shell is a service that provides a web-based shell where GCP administrative activities can be performed. A web-based shell is a […]

The post How an Attacker Can Achieve Persistence in Google Cloud Platform (GCP) with Cloud Shell appeared first on Security Intelligence.

Continue reading How an Attacker Can Achieve Persistence in Google Cloud Platform (GCP) with Cloud Shell

How Native Security Controls Fit Into Today’s Hybrid Multicloud Environments

Corporate clients and cloud service providers (CSPs) are both responsible for cloud security. Clients remain accountable for governance and compliance. However, their other duties will vary depending upon the type of cloud deployment. What can cloud-native security controls do for your business? What can’t they do? When should you consider using them?  CSPs have created native […]

The post How Native Security Controls Fit Into Today’s Hybrid Multicloud Environments appeared first on Security Intelligence.

Continue reading How Native Security Controls Fit Into Today’s Hybrid Multicloud Environments

Avoid Blind Spots: Is Your Incident Response Team Cloud Ready?

The year 2020 — with all its tumult — ushered in a massive shift in the way most companies work. Much of that transformation included migrating to cloud, with some statisticians reporting that a full 50% of companies across the globe are now using cloud technology. In many ways, that’s good — cloud holds several […]

The post Avoid Blind Spots: Is Your Incident Response Team Cloud Ready? appeared first on Security Intelligence.

Continue reading Avoid Blind Spots: Is Your Incident Response Team Cloud Ready?

Cloud Data Privacy: Now, Where Did I Put Those Keys?

Let’s say you’re about to walk out of the house and realize you’ve forgotten your keys. The first thing a family member will probably ask you is “Where did you last have them?” But at work, asking for the keys to a cloud — the keys that ensure data privacy — might get a different […]

The post Cloud Data Privacy: Now, Where Did I Put Those Keys? appeared first on Security Intelligence.

Continue reading Cloud Data Privacy: Now, Where Did I Put Those Keys?

Cloud Data Privacy: Now, Where Did I Put Those Keys?

Let’s say you’re about to walk out of the house and realize you’ve forgotten your keys. The first thing a family member will probably ask you is “Where did you last have them?” But at work, asking for the keys to a cloud — the keys that ensure data privacy — might get a different […]

The post Cloud Data Privacy: Now, Where Did I Put Those Keys? appeared first on Security Intelligence.

Continue reading Cloud Data Privacy: Now, Where Did I Put Those Keys?

Cloud-Native IAM Controls Part 2: An Approach for Governance

Some organizations with multicloud environments opt for a cloud service provider with native identity access management (IAM). However, these same people often struggle when it comes to adding the cloud-native controls into a larger enterprise IAM program. In part 1 of our cloud-native IAM controls blog, we explored why these controls are not enough for […]

The post Cloud-Native IAM Controls Part 2: An Approach for Governance appeared first on Security Intelligence.

Continue reading Cloud-Native IAM Controls Part 2: An Approach for Governance

Cloud Native Tools Series Part 2: Understand Your Responsibilities

As I mentioned in my first blog: traditional security just doesn’t work in the cloud. Businesses dependent on the cloud can make up for this by choosing native cloud security tools. But, they can’t do so unless they understand what aspects of cloud security they’re responsible for. The AWS Shared Security Model as a Guide Luckily, […]

The post Cloud Native Tools Series Part 2: Understand Your Responsibilities appeared first on Security Intelligence.

Continue reading Cloud Native Tools Series Part 2: Understand Your Responsibilities

The Connection Between Cloud Service Providers and Cyber Resilience

Cloud service providers offer great performance and resilience, but ultimately it is up to individual organizations to determine whether these long-known advantages outweigh the possible downsides.

The post The Connection Between Cloud Service Providers and Cyber Resilience appeared first on Security Intelligence.

Continue reading The Connection Between Cloud Service Providers and Cyber Resilience

Support Remote Workforce Productivity With Secure Cloud Services

The remote workforce has become increasingly mainstream around the world, but this model depends on thorough cloud security to ensure business operations can continue.

The post Support Remote Workforce Productivity With Secure Cloud Services appeared first on Security Intelligence.

Continue reading Support Remote Workforce Productivity With Secure Cloud Services

Is a Managed Security Services Provider (MSSP) Right for Your Organization?

Leveraging a managed security services provider can help reduce risk and improve incident response. But when should companies make the call?

The post Is a Managed Security Services Provider (MSSP) Right for Your Organization? appeared first on Security Intelligence.

Continue reading Is a Managed Security Services Provider (MSSP) Right for Your Organization?