As more employees opt for remote work, organizations rely on cloud computing options for easy access to corporate data and applications. This dependence on the cloud also puts a new emphasis on cloud security.
Yet, cloud security continues to be an afterthought for many companies. Industry leaders may be confused over who is responsible for security
What is a Certified Cloud Penetration Tester (CCPT) certification?The CCPT certification is offered by the Information Assurance Certification Review Board to validate an applicant’s skills in cloud hacking and penetration testing. The certification is designed to demonstrate that an applicant has expert-level knowledge regarding Azure and AWS penetrat
We have all heard the castle-and-moat analogy to describe traditional centralized approaches to cybersecurity. As cloud security becomes increasingly important in the modern landscape, I think we should add one more component to the analogies we use to think about security: fog. Sometimes the fog is so thick that you can barely see what is in front of you or
Kaspersky Security Bulletin 2019. Advanced threat predictions for 2020
Cybersecurity of connected healthcare 2020: Overview and predictions
5G technology predictions 2020
Cyberthreats to financial institutions 2020: Overview and predictions
Moving to the cloud
The popularity of cloud services is growing, and threat actors are here to exploit the trend.
We
IntroductionCloud technology is continuing to grow. Amazon Web Services (AWS) and Microsoft Azure are two cloud providers and platforms that are dominating the cloud space, but they are not alone. Other cloud platforms include Google Cloud, IBM Bluemix and Alibaba, and that’s not even all of them.With these multiple options, it may be tough to decide w
In the most recent Leadership Compass for CIAM, KuppingerCole analyzed CIAM vendors and named IBM Cloud Identity Service a market leader in the consumer identity and access management (CIAM) space. The CIAM analyst and author of the Leadership Compass, John Tolbert, provided a helpful overview of the consumer IAM market as well as a compass for readers to us
There are two popular attitudes about cloud security, and both of them are wrong.
One belief is that putting data in the cloud amounts to putting it on the public internet for anyone to access. Therefore, the only way to keep data safe is to keep it at home and out of the cloud altogether. The opposite belief is that cloud providers cover their own bases wel
As The Wall Street Journal recently pointed out, some clients of cloud service providers such as Amazon and Microsoft are accidentally leaving their cloud databases exposed due to misconfigurations of their services. Coupled with recent headline-making breaches, it’s becoming clear that the greatest risks to an organization might come down to a simple
Securing a Cloud deploymentThese days many organizations have migrated at least some of their IT services to a cloud environment. Cloud adaptation could be as basic as the use of Microsoft Office 365 on some workstations, or it could be much more comprehensive, such as the use of a fully integrated Azure or Amazon AWS infrastructure. One of the main re
According to a recent Forrester report, enterprise cloud computing adoption accelerated in 2016 and will do so again in 2017. Software-as-a-service (SaaS) remains the largest portion of the public cloud market, with global spending expected to reach $105 billion in 2017 and $155 billion by 2020. Infrastructure-as-a-service (IaaS) and platform-as-a-service (
Co-authored by Chris Craig.
To match the ongoing shift to cloud as a means of increasing agility when delivering services, the architectures supporting these services are also evolving. The cloud IT space is full of terminology such as infrastructure-as-code, highly scalable architectures and microservices architecture — a methodology that is gathering sig
Security is the primary focus of any government agency. One of the most obvious pitfalls of these agencies moving highly sensitive data to the cloud is that they surrender control to a third party. Moreover, nothing on the internet is truly secure, and all data is vulnerable to attacks and threats.
The exposure footprint to those threats is staggering unde
When implementing cloud projects, security is one of the most important issues. It requires companies to identify and understand the risks inherent to digitization, public networks and outsourcing of infrastructure components.
Companies still fear that their data is insecure with cloud systems. IT professionals want to apply the same level of security to t
Now that cloud has become pervasive, organizations and individuals everywhere need to think about cloud security. To say that data is either fully secure or vulnerable in the cloud would be far too simplistic.
Two Schools of Thought
There are two widespread but opposite beliefs surrounding security in the public cloud:
Abandon all hope! When you send dat
One of the most important benefits of the use of cloud instances over traditional network configurations is that one can be literally setup within seconds, by the click of a few buttons. This ability has dramatically reduced deployment times for test, model, and production systems. It also allows for great flexibility both from a technical and a billin