Securing Kubernetes as it becomes mainstream

In this interview with Help Net Security, Shauli Rozen, CEO at ARMO, talks about securing Kubernetes (K8s) systems, what makes them susceptible to cyberattacks and what should organizations expect when deploying them. As every other platform, Kubernete… Continue reading Securing Kubernetes as it becomes mainstream

9 tips to avoid cloud configuration conundrums

Configuration-related errors continue to result in avoidable losses of customer data and, consequently, their trust and loyalty, as well as revenue. The recent T-Mobile’s breach is reported to be the result of a misconfiguration that made an acce… Continue reading 9 tips to avoid cloud configuration conundrums

Checking for misconfigurations isn’t enough

Misconfiguration errors are often the main focus of security for cloud-native applications, and for good reason. Earlier this year, Hobby Lobby accidentally exposed 136 GB of sensitive data for 300,000 customers. Artwork Archive was recently alerted th… Continue reading Checking for misconfigurations isn’t enough

Can on-prem security experts make the move to the cloud?

As cloud computing grows in popularity across all use cases, cloud workloads have never been more attractive to malicious actors. A recent McAfee report points to a 630 percent increase in attacks aimed at cloud services since January 2020. There are s… Continue reading Can on-prem security experts make the move to the cloud?

Cloud security posture confidence is high, yet most IT pros have experienced a cloud-related breach

OpsCompass announced the results of a report it conducted on cloud security posture and management challenges. The report is based on survey responses from 253 full-time, US-based, IT professionals who develop, and either deploy or manage enterprise cl… Continue reading Cloud security posture confidence is high, yet most IT pros have experienced a cloud-related breach

Unprotected CVS database exposed sensitive customer searches

Researchers have discovered an unprotected, exposed online database with over a billion records belonging to American healthcare company CVS Health. The discovery, made by researcher Jeremiah Fowler and the WebsitePlanet research team, happened in Marc… Continue reading Unprotected CVS database exposed sensitive customer searches

“Network Security” the Biggest Concern for Public Cloud Adoption, Reveals Survey

Cloud misconfigurations represent something that’s plaguing many organizations’ cloud adoption efforts. For example, a 2020 report found that 91% of cloud deployments contained at least one misconfiguration that left organizations exposed to potential … Continue reading “Network Security” the Biggest Concern for Public Cloud Adoption, Reveals Survey

Most organizations fail to fix cloud misconfiguration issues in a timely manner

A significant majority of companies that move to multi-cloud environments are not properly configuring their cloud-based services, Aqua Security reveals. According to the report findings, these misconfigurations, for example leaving bucket or blog stor… Continue reading Most organizations fail to fix cloud misconfiguration issues in a timely manner

Acting on a security risk assessment of your organization’s use of Salesforce

Salesforce isn’t rocket science, but the software has an incredible array of tools, which is why securing it demands a unique (and sometimes complex) approach. If you’re hoping to mitigate risks associated with your company’s use of Salesforce, y… Continue reading Acting on a security risk assessment of your organization’s use of Salesforce

Cloud native adoption increasing security concerns

Cloud native adoption has both transformed the way organizations build modern applications and resulted in increased security threats and concerns, according to a research by Snyk. Most notably, the report found that: More than half of companies survey… Continue reading Cloud native adoption increasing security concerns