Preventing Criminals from Using Cloud Applications to Inject Chaos Into Work Environments

In 2020, cyber criminals used cloud applications, the cover of a pandemic, and a newly embraced work-from-home culture to serve up ransomware, steal data, and disrupt how companies do business. The year is over, but the challenges and risks remain.  H… Continue reading Preventing Criminals from Using Cloud Applications to Inject Chaos Into Work Environments

Delivering on the Promise of Application Security in the Cloud

Application security has become a complex, distributed problem.  During the days of waterfall development and monolithic applications, application security was pretty straight forward – statically scan your source code, dynamically test your business … Continue reading Delivering on the Promise of Application Security in the Cloud

Passwords a Threat to Public Infrastructure

With this year’s World Password Day upon us, it’s high time to take a good look at the critical infrastructure sector and the password-related security vulnerabilities that are in dire need of an update. While modern utility systems become increasingl… Continue reading Passwords a Threat to Public Infrastructure

Sysmon Endpoint Monitoring: Do You Really Need an EDR?

The post Sysmon Endpoint Monitoring: Do You Really Need an EDR? appeared first on Security Weekly. Continue reading Sysmon Endpoint Monitoring: Do You Really Need an EDR?

MS Teams: The Gateway Drug to Security Chaos

We all know the COVID-19 pandemic forced organizations to rapidly accelerate their adoption of collaboration solutions. For organizations already using Office 365 or Microsoft 365, Microsoft Teams was a readily available answer to the remote workforce… Continue reading MS Teams: The Gateway Drug to Security Chaos

Why You Need PAM and VPAM in 2020

As IT and security managers begin to organize and submit their 2020 budget requests, privileged access management (PAM) or vendor privileged access management (VPAM) may be on the list of competing priorities. PAM is a more sophisticated way to handle… Continue reading Why You Need PAM and VPAM in 2020

How Mature is Your Security Automation? See the Survey Results and How You Compare.

We hear a lot about security orchestration, automation, and response.  It will help us with our security skills gap.  It will improve our operational efficiency, thus reducing mean time to detect and respond to incidents.  It will give us more time for… Continue reading How Mature is Your Security Automation? See the Survey Results and How You Compare.

Assessing the Risk of the Former Employee

Employees leaving a company can pose a real risk to the security of an organization Many years ago, I left a job to take a new position. Several weeks after I made the move, I was searching for some information and realized that it may have been in my… Continue reading Assessing the Risk of the Former Employee

Michael Aiello, Google – Enterprise Security Weekly #146

Security Responsibility in Hybrid and Multi-cloud
The post Michael Aiello, Google – Enterprise Security Weekly #146 appeared first on Security Weekly. Continue reading Michael Aiello, Google – Enterprise Security Weekly #146