HackDig : Dig high-quality web security articles for hackers

Grow Your Business With an Evolving Cloud Security Strategy

We have all heard the castle-and-moat analogy to describe traditional centralized approaches to cybersecurity. As cloud security becomes increasingly important in the modern landscape, I think we should add one more component to the analogies we use to think about security: fog. Sometimes the fog is so thick that you can barely see what is in front of you or
Publish At:2020-03-17 10:37 | Read:420 | Comments:0 | Tags:Cloud Security Security Intelligence & Analytics Business Co

Corporate security prediction 2020

Kaspersky Security Bulletin 2019. Advanced threat predictions for 2020 Cybersecurity of connected healthcare 2020: Overview and predictions 5G technology predictions 2020 Cyberthreats to financial institutions 2020: Overview and predictions Moving to the cloud The popularity of cloud services is growing, and threat actors are here to exploit the trend. We
Publish At:2019-12-03 06:05 | Read:991 | Comments:0 | Tags:Kaspersky Security Bulletin Cloud Computing Cyber espionage

AWS vs. Azure vs. Cloud+: To specialize, generalize or both?

IntroductionCloud technology is continuing to grow. Amazon Web Services (AWS) and Microsoft Azure are two cloud providers and platforms that are dominating the cloud space, but they are not alone. Other cloud platforms include Google Cloud, IBM Bluemix and Alibaba, and that’s not even all of them.With these multiple options, it may be tough to decide w
Publish At:2019-10-18 10:15 | Read:1543 | Comments:0 | Tags:Cloud Computing Cloud

CIAM Vendors Report: IBM Cloud Identity Service Named Market Leader in Consumer IAM Leadership Compass

In the most recent Leadership Compass for CIAM, KuppingerCole analyzed CIAM vendors and named IBM Cloud Identity Service a market leader in the consumer identity and access management (CIAM) space. The CIAM analyst and author of the Leadership Compass, John Tolbert, provided a helpful overview of the consumer IAM market as well as a compass for readers to us
Publish At:2017-11-01 18:45 | Read:4624 | Comments:0 | Tags:Cloud Security Identity & Access Cloud Computing Cloud Ident

The Cloud Security Risks Hidden in Plain Sight

There are two popular attitudes about cloud security, and both of them are wrong. One belief is that putting data in the cloud amounts to putting it on the public internet for anyone to access. Therefore, the only way to keep data safe is to keep it at home and out of the cloud altogether. The opposite belief is that cloud providers cover their own bases wel
Publish At:2017-09-22 13:40 | Read:4460 | Comments:0 | Tags:Cloud Security Risk Management Access Management Cloud Cloud

Leaking Cloud Databases and Servers Expose Over 1 Billion Records

As The Wall Street Journal recently pointed out, some clients of cloud service providers such as Amazon and Microsoft are accidentally leaving their cloud databases exposed due to misconfigurations of their services. Coupled with recent headline-making breaches, it’s becoming clear that the greatest risks to an organization might come down to a simple
Publish At:2017-09-21 19:15 | Read:8793 | Comments:0 | Tags:Advanced Threats Cloud Security Data Protection Software & A

Cloud Service Reconnaissance

Securing a Cloud deploymentThese days many organizations have migrated at least some of their IT services to a cloud environment. Cloud adaptation could be as basic as the use of Microsoft Office 365 on some workstations, or it could be much more comprehensive, such as the use of a fully integrated Azure or Amazon AWS infrastructure. One of the main re
Publish At:2017-09-08 09:35 | Read:4057 | Comments:0 | Tags:Cloud Computing Cloud

Shrink Your Enterprise Cloud Computing Security Concerns With a Cloud Vendor Risk Management Program

According to a recent Forrester report, enterprise cloud computing adoption accelerated in 2016 and will do so again in 2017. Software-as-a-service (SaaS) remains the largest portion of the public cloud market, with global spending expected to reach $105 billion in 2017 and $155 billion by 2020. Infrastructure-as-a-service (IaaS) and platform-as-a-service (
Publish At:2017-08-22 09:30 | Read:5338 | Comments:0 | Tags:Cloud Security Risk Management Cloud Cloud Adoption Cloud Co

Best Practices for Developing and Securing a Microservices Architecture

Co-authored by Chris Craig. To match the ongoing shift to cloud as a means of increasing agility when delivering services, the architectures supporting these services are also evolving. The cloud IT space is full of terminology such as infrastructure-as-code, highly scalable architectures and microservices architecture — a methodology that is gathering sig
Publish At:2017-08-15 11:45 | Read:3788 | Comments:0 | Tags:Cloud Security Cloud Cloud Adoption Cloud Computing Cloud Se

Is Cloud Security a Safe Bet for Highly Sensitive Government Data?

Security is the primary focus of any government agency. One of the most obvious pitfalls of these agencies moving highly sensitive data to the cloud is that they surrender control to a third party. Moreover, nothing on the internet is truly secure, and all data is vulnerable to attacks and threats. The exposure footprint to those threats is staggering unde
Publish At:2017-07-28 21:55 | Read:4990 | Comments:0 | Tags:Cloud Security Data Protection Government Cloud Adoption Clo

Who Is Responsible for Cloud Security?

When implementing cloud projects, security is one of the most important issues. It requires companies to identify and understand the risks inherent to digitization, public networks and outsourcing of infrastructure components. Companies still fear that their data is insecure with cloud systems. IT professionals want to apply the same level of security to t
Publish At:2017-07-24 17:25 | Read:8089 | Comments:0 | Tags:Cloud Security Data Protection Identity & Access Cloud Cloud

Cloud Security Is Not an Either/Or

Now that cloud has become pervasive, organizations and individuals everywhere need to think about cloud security. To say that data is either fully secure or vulnerable in the cloud would be far too simplistic. Two Schools of Thought There are two widespread but opposite beliefs surrounding security in the public cloud: Abandon all hope! When you send dat
Publish At:2017-07-20 21:00 | Read:3449 | Comments:0 | Tags:Cloud Security Cloud Cloud Computing Data Breach Human Facto

Security Concerns Around Zombie Cloud Infrastructure

One of the most important benefits of the use of cloud instances over traditional network configurations is that one can be literally setup within seconds, by the click of a few buttons. This ability has dramatically reduced deployment times for test, model, and production systems. It also allows for great flexibility both from a technical and a billin
Publish At:2017-07-20 20:35 | Read:3558 | Comments:0 | Tags:Cloud Computing Cloud

NetFlow Data Collection in Cloud Systems

The value of NetFlowWithin a network, connectivity is everything, but within a secure network, visibility is also everything. NetFlow data can provide both these requirements. NetFlow is a Cisco proprietary technology which allows for the collection of metadata generated by the traffic (flow) within a network. This metadata is invaluable for capacity p
Publish At:2017-06-12 11:45 | Read:4099 | Comments:0 | Tags:Cloud Computing Cloud

Secure Shipping of Physical Data Carriers to and from a Cloud Service Provider

A cloud environment is ideally suited to store and analyze large amounts of data. If more storage space, CPU or memory resources are needed, services can usually be upgraded with ease. This situation is likely to occur because data tends to grow over time. This data could, for instance, be a sales database, ingesting logs from an e-commerce platform. T
Publish At:2017-04-28 13:35 | Read:3907 | Comments:0 | Tags:Cloud Computing Cloud

Announce

Share high-quality web security related articles with you:)

Tools