Microsoft removed 18 apps from its Azure cloud platform that were being used by hackers as part of their command-and-control infrastructure. The threat group, called Gadolinium, was abusing the infrastructure to launch phishing email attacks, Microsoft researchers say.
Revisiting remote workforce security defenses, simplifying cloud access controls and pursuing risk-based vulnerability management and passwordless authentication are among the 10 security projects that all organizations should consider for this year and next, according to advisory firm Gartner.
The ephemeral and dynamic nature of cloud resources makes traditional security perimeters insufficient for successful risk management. The cloud needs a new perimeter - identity. Unfortunately, the complexity of the cloud infrastructure and cloud provider identity and access management (IAM) tools makes it...
The cloud has gone from being a trend to being inevitable in every digital initiative an organization will undertake.
The benefits of the cloud are far reaching and significant. It saves money, improves and accelerates innovation, and makes organizations more agile in meeting market trends and competitive...
Kubernetes has become the de facto operating system of the cloud. This rapid success is understandable, as Kubernetes makes it easy for developers to package their applications into portable microservices. However, Kubernetes can be challenging to operate. Teams often put off addressing security processes until they...
In the wake of the public health crisis of 2020, work-from-home orders issued by most companies and governments have further accelerated this digitalization and adoption of remote services. The expansion of the virtual workforce and adoption of cloud has emphasized the need for security and compliance in the...
The need for enhanced business agility and secure remote access to support digital transformation has led to the adoption of the security access service edge, or SASE, model, says Rajpreet Kaur, senior principal analyst at Gartner.
The emerging cloud-delivered service model known as security access service edge, or SASE, is designed to help simplify security for remote access, says Sean Duca of Palo Alto Networks, who explains how the model works.
Security teams need to plan and prepare for a consistent security and compliance posture across a larger, more fluid ecosystem in the cloud. To cover the additional attack surface, it's important to know all the nooks and crannies, and what operates within them. One of these operators are the App Dev teams that...
In this new era, every enterprise is suddenly "cloud first." But there are significant data security gaps to avoid before putting critical data in the cloud. Imperva's Terry Ray shares strategies to maximize simplicity and regulatory compliance.
In this Ebook on cloud security Ray discusses:
Biggest cloud security...
In order to address the shift in networking and security requirements, a new architecture is needed.
With the common framework a SASE provides, organizations can simplify management, get consistent visibility, and maximize network protection across users, devices and applications, no matter their location.
Get a...
Threats have become a board-level concern and it's fueled a spending spree in security products over the last two years. So why don't companies feel more prepared to identify and respond to these threats?
For many organizations, disconnected point solutions have increased the complexity of their security...
Choosing the right security platform.
Finding a security platform for your organization can be a difficult task. In cybersecurity, the term “platform” has become overused, making it difficult to cut through the noise and understand which factors matter in choosing the best option for your business.
The...
The rapid shift to digital business models that use cloud services, such as SaaS and cloud service providers, is the latest development in the information revolution. Like other revolutions of the past, the change the cloud brings offers tremendous benefits as well as significant new challenges.
Read this guide to...
Multi-cloud is the new norm, and it's only getting more crowded. ESG findings show that "81% of current cloud infrastructure users are running two or more public cloud infrastructure providers", and of those users, "61% are using three or more". With all cloud providers offering logging and metrics services, you'd...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.