HackDig : Dig high-quality web security articles for hackers

Box Showcases New Offerings for Remote Working Environment

The primary problem caused by the growth in remote working is a new degree of complexity. The threats remain the same, but the solutions must be new. Box on Wednesday announced additions and enhancements to its range of products designed for the growing remote working environment.Box is expanding its capabilities by improving both the operation and security
Publish At:2020-09-16 12:22 | Read:82 | Comments:0 | Tags:NEWS & INDUSTRY Cloud Security Data Protection

Oracle Announces Availability of Cloud Guard, Maximum Security Zones

Oracle on Monday announced the general availability of its Cloud Guard and Maximum Security Zones cloud security tools.Cloud Guard and Maximum Security Zones were some of the new security services univeled by Oracle in September 2019. Offered to Oracle Cloud customers at no extra cost, they help automate threat response and reduce risk.Oracle Cloud Guard, no
Publish At:2020-09-15 05:04 | Read:155 | Comments:0 | Tags:NEWS & INDUSTRY Cloud Security Cloud security

Container Security Firm StackRox Raises $26.5 Million

Container and Kubernetes security company StackRox on Thursday announced that it raised another $26.5 million in funding, which brings the total investment secured by the firm to $61 million.The latest funding round was led by Menlo Ventures, with participation from Highland Capital Partners, Hewlett-Packard Enterprise, Sequoia Capital and Redpoint Ventures.
Publish At:2020-09-10 15:34 | Read:114 | Comments:0 | Tags:NEWS & INDUSTRY Cloud Security Management & Strategy

Developer Security Firm Snyk Raises $200 Million at $2.6 Billion Valuation

Boston-based developer security company Snyk on Wednesday announced that it has raised $200 million in a Series D funding round, valuing the firm at more than $2.6 billion.The latest funding round, which brings the total raised by Snyk to $450 million, was led by Addition, with participation from previous investors Accel, Amity, Boldstart, Canaan, Coatue, GV
Publish At:2020-09-09 12:12 | Read:188 | Comments:0 | Tags:NEWS & INDUSTRY Application Security Cloud Security Mana

Researchers Spot First Cloud Attack Abusing Legitimate Tool

A hacking group was observed employing a legitimate tool to gain visibility into and control of compromised cloud environments, threat detection and response company Intezer reported on Tuesday.Referred to as TeamTNT, the group was previously seen employing a worm to target Docker and Kubernetes systems in order to search for and exfiltrate local credentials
Publish At:2020-09-09 00:28 | Read:177 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Virus & Malware

Ransomware Attacks: How to Protect your Data With Encryption

Cybercriminals are making headlines using ransomware to block organizations from accessing their own critical business data to extort ransoms. Recently, the University of California San Francisco fell victim to a ransomware attack on key academic and research data (the institution is known to be working on a cure for COVID-19) and ended up paying over $1.14
Publish At:2020-09-04 12:08 | Read:180 | Comments:0 | Tags:Cloud Security Data Protection Identity & Access Malware Mob

Digital Transformation: Breaking Down Silos for Better Data Security

Today, enterprises are under pressure to improve the power and reduce the cost of running mission-critical business applications by migrating to modern software architectures. By breaking down the silos between adjacent teams and the tools they use, security teams can do this at the same time as they take steps toward zero trust and true security unificatio
Publish At:2020-08-20 08:22 | Read:286 | Comments:0 | Tags:Cloud Security Data Protection Zero Trust Multicloud Cyberse

Threat Modeling in a Container Environment

As organizations turn to hybrid solutions, an increasing number of businesses are turning to container orchestration to provide a seamless solution to computing between environments. “Containers are units of software in which the code and all its dependencies are packed, allowing applications to run quickly and efficiently from one computing envi
Publish At:2020-08-17 10:00 | Read:305 | Comments:0 | Tags:Cloud Security threat modeling Cloud Containerization Hybrid

New Ponemon Report: A Programmatic Approach to Vulnerability Management for Hybrid Multicloud

X-Force Red is unveiling a new research study, conducted by the Ponemon Institute, that highlights vulnerability management challenges for on-premises and cloud environments: in other words, hybrid multicloud. The report, “The State of Vulnerability Management in the Cloud and On-Premises,” is based on a global survey of 1,848 IT and IT security
Publish At:2020-08-17 07:03 | Read:250 | Comments:0 | Tags:Cloud Security Security Services Software & App Vulnerabilit

Adaptive Shield Emerges From Stealth to Secure SaaS Applications

With $4 million in seed funding, Adaptive Shield this week emerged from stealth mode to automate the security of software-as-a-service (SaaS) applications.The Tel Aviv, Israel-based startup seeks to tackle the issue of incorrect configuration of SaaS applications, which can expose them to cyberattacks, data leaks, and other risks.SaaS security configuration
Publish At:2020-08-14 16:12 | Read:151 | Comments:0 | Tags:NEWS & INDUSTRY Application Security Cloud Security Mana

SASE Provider Perimeter 81 Raises $40 Million

Secure Access Service Edge (SASE) and Network-as-a-Service (NaaS) solutions provider Perimeter 81 has closed a $40 million Series B funding round that brings the total raised by the company to $65 million.Founded in 2018 and headquartered in Tel Aviv, Israel, the startup provides a cloud-based Security-as-a-Service (SaaS) solution that aims to secure access
Publish At:2020-08-13 00:19 | Read:173 | Comments:0 | Tags:Network Security NEWS & INDUSTRY Application Security Id

SecurityWeek to Host Virtual Cloud Security Summit on August 13, 2020

SecurityWeek will host its 2020 Cloud Security Summit virtual event on Thursday, August 13, 2020.Through a fully immersive virtual environment, attendees will be able to interact with leading solution providers and other end users tasked with securing various cloud environments and services.SecurityWeek’s Cloud Security Summit will help organizations learn h
Publish At:2020-08-12 12:44 | Read:235 | Comments:0 | Tags:NEWS & INDUSTRY Cloud Security Cloud

Survey: 76% of IT Pros Say It’s Difficult to Maintain Security Configs in the Cloud

Cloud misconfigurations are no laughing matter. In its “2020 Cloud Misconfigurations Report,” DivvyCloud revealed that 196 separate data breaches involving cloud misconfigurations had cost companies a combined total of approximately $5 trillion between January 1, 2018 and December 31, 2019. The problem is that those costs could be even higher; as
Publish At:2020-08-12 09:49 | Read:184 | Comments:0 | Tags:Cloud Featured Articles cloud security configuration Survey

Data Security Company Symmetry Systems Emerges From Stealth

Symmetry Systems, a provider of data store and object security (DSOS) solutions, emerged from stealth mode on Tuesday with $3 million in seed funding from ForgePoint Capital and Prefix Capital.Symmetry Systems was founded by Mohit Tiwari, a former cybersecurity professor at the University of Texas, and Casen Hunger, one of Tiwari’s former students. The compa
Publish At:2020-08-11 09:30 | Read:197 | Comments:0 | Tags:NEWS & INDUSTRY Identity & Access Cloud Security Dat

Loving the Algorithm: User Risk Management and Good Security Hygiene

User risk management watches where people can’t. If you polled a random sampling of employees at various organizations, most would probably consider themselves security-minded. They would argue that they are not actively sending sensitive data to malicious recipients, clicking strange links or downloading attachments from unknown senders. This mindset
Publish At:2020-08-07 09:04 | Read:275 | Comments:0 | Tags:Endpoint Mobile Security Cloud Security Insider Threat Risk


Tag Cloud