“Authorized” to break in: Adversaries use valid credentials to compromise cloud environments

Overprivileged plaintext credentials left on display in 33% of X-Force adversary simulations Adversaries are constantly seeking to improve their productivity margins, but new data from IBM X-Force suggests they aren’t exclusively leaning on sophistication to do so. Simple yet reliable tactics that offer ease of use and often direct access to privileged environments are still […]

The post “Authorized” to break in: Adversaries use valid credentials to compromise cloud environments appeared first on Security Intelligence.

Continue reading “Authorized” to break in: Adversaries use valid credentials to compromise cloud environments

The Biden administration may eye CSPs to improve security, but the real caveat emptor? Secure thyself

While the administration may look to strengthen security against cyberattackers for cloud providers, like Amazon, Microsoft and Google, experts say the onus is on the customer.
The post The Biden administration may eye CSPs to improve security, but the… Continue reading The Biden administration may eye CSPs to improve security, but the real caveat emptor? Secure thyself

Old Habits Die Hard: New Report Finds Businesses Still Introducing Security Risk into Cloud Environments

While cloud computing and its many forms (private, public, hybrid cloud or multi-cloud environments) have become ubiquitous with innovation and growth over the past decade, cybercriminals have closely watched the migration and introduced innovations of their own to exploit the platforms. Most of these exploits are based on poor configurations and human error. New IBM […]

The post Old Habits Die Hard: New Report Finds Businesses Still Introducing Security Risk into Cloud Environments appeared first on Security Intelligence.

Continue reading Old Habits Die Hard: New Report Finds Businesses Still Introducing Security Risk into Cloud Environments

Securing Cloud Technology in a Growing Threat Landscape

Cloud technologies are becoming more and more popular. Many companies shifted their workloads and their IT infrastructures into the cloud. The advantages are clear: more flexibility and scalability, less admin overhead and often cost savings. But with those advantages also come many risks. Recent studies have shown several threats cloud technologies face. As data transfers […]

The post Securing Cloud Technology in a Growing Threat Landscape appeared first on Security Intelligence.

Continue reading Securing Cloud Technology in a Growing Threat Landscape

One Small Error by DevOps, One Giant Opening for Attackers

When you look at breach statistics in today’s cloud-dominated IT world, you can see several examples where a small error made by the DevOps or CloudOps team has led to a tremendous impact on businesses’ reputations or, in some cases, their existence. Misconfigured AWS S3 buckets, poor password management on publicly exposed databases and secrets […]

The post One Small Error by DevOps, One Giant Opening for Attackers appeared first on Security Intelligence.

Continue reading One Small Error by DevOps, One Giant Opening for Attackers

One Small Error by DevOps, One Giant Opening for Attackers

When you look at breach statistics in today’s cloud-dominated IT world, you can see several examples where a small error made by the DevOps or CloudOps team has led to a tremendous impact on businesses’ reputations or, in some cases, their existence. Misconfigured AWS S3 buckets, poor password management on publicly exposed databases and secrets […]

The post One Small Error by DevOps, One Giant Opening for Attackers appeared first on Security Intelligence.

Continue reading One Small Error by DevOps, One Giant Opening for Attackers

Threat Modeling Approaches: On Premises or Third Party?

What’s the difference between on-premises and cloud security threat modeling approaches? Both can help protect against cloud threats and have distinct benefits and risks. The latest tech developments are happening here in the cross-section of cybersecurity and cloud security. More and more treasured data is being kept and used to make data-driven decisions. So, defending […]

The post Threat Modeling Approaches: On Premises or Third Party? appeared first on Security Intelligence.

Continue reading Threat Modeling Approaches: On Premises or Third Party?