HackDig : Dig high-quality web security articles for hackers

Implement Cloud Security Best Practices With This Guide

As more employees opt for remote work, organizations rely on cloud computing options for easy access to corporate data and applications. This dependence on the cloud also puts a new emphasis on cloud security.   Yet, cloud security continues to be an afterthought for many companies. Industry leaders may be confused over who is responsible for security
Publish At:2020-11-12 10:58 | Read:256 | Comments:0 | Tags:Cloud Security Cloud Computing Cloud Strategy Cloud security

Cloud Pentesting Certification Boot Camp: The ultimate guide

What is a Certified Cloud Penetration Tester (CCPT) certification?The CCPT certification is offered by the Information Assurance Certification Review Board to validate an applicant’s skills in cloud hacking and penetration testing. The certification is designed to demonstrate that an applicant has expert-level knowledge regarding Azure and AWS penetrat
Publish At:2020-09-16 13:23 | Read:678 | Comments:0 | Tags:Cloud Computing Cloud

Grow Your Business With an Evolving Cloud Security Strategy

We have all heard the castle-and-moat analogy to describe traditional centralized approaches to cybersecurity. As cloud security becomes increasingly important in the modern landscape, I think we should add one more component to the analogies we use to think about security: fog. Sometimes the fog is so thick that you can barely see what is in front of you or
Publish At:2020-03-17 10:37 | Read:1004 | Comments:0 | Tags:Cloud Security Security Intelligence & Analytics Business Co

Corporate security prediction 2020

Kaspersky Security Bulletin 2019. Advanced threat predictions for 2020 Cybersecurity of connected healthcare 2020: Overview and predictions 5G technology predictions 2020 Cyberthreats to financial institutions 2020: Overview and predictions Moving to the cloud The popularity of cloud services is growing, and threat actors are here to exploit the trend. We
Publish At:2019-12-03 06:05 | Read:1622 | Comments:0 | Tags:Kaspersky Security Bulletin Cloud Computing Cyber espionage

AWS vs. Azure vs. Cloud+: To specialize, generalize or both?

IntroductionCloud technology is continuing to grow. Amazon Web Services (AWS) and Microsoft Azure are two cloud providers and platforms that are dominating the cloud space, but they are not alone. Other cloud platforms include Google Cloud, IBM Bluemix and Alibaba, and that’s not even all of them.With these multiple options, it may be tough to decide w
Publish At:2019-10-18 10:15 | Read:2669 | Comments:0 | Tags:Cloud Computing Cloud

CIAM Vendors Report: IBM Cloud Identity Service Named Market Leader in Consumer IAM Leadership Compass

In the most recent Leadership Compass for CIAM, KuppingerCole analyzed CIAM vendors and named IBM Cloud Identity Service a market leader in the consumer identity and access management (CIAM) space. The CIAM analyst and author of the Leadership Compass, John Tolbert, provided a helpful overview of the consumer IAM market as well as a compass for readers to us
Publish At:2017-11-01 18:45 | Read:5187 | Comments:0 | Tags:Cloud Security Identity & Access Cloud Computing Cloud Ident

The Cloud Security Risks Hidden in Plain Sight

There are two popular attitudes about cloud security, and both of them are wrong. One belief is that putting data in the cloud amounts to putting it on the public internet for anyone to access. Therefore, the only way to keep data safe is to keep it at home and out of the cloud altogether. The opposite belief is that cloud providers cover their own bases wel
Publish At:2017-09-22 13:40 | Read:5127 | Comments:0 | Tags:Cloud Security Risk Management Access Management Cloud Cloud

Leaking Cloud Databases and Servers Expose Over 1 Billion Records

As The Wall Street Journal recently pointed out, some clients of cloud service providers such as Amazon and Microsoft are accidentally leaving their cloud databases exposed due to misconfigurations of their services. Coupled with recent headline-making breaches, it’s becoming clear that the greatest risks to an organization might come down to a simple
Publish At:2017-09-21 19:15 | Read:9785 | Comments:0 | Tags:Advanced Threats Cloud Security Data Protection Software & A

Cloud Service Reconnaissance

Securing a Cloud deploymentThese days many organizations have migrated at least some of their IT services to a cloud environment. Cloud adaptation could be as basic as the use of Microsoft Office 365 on some workstations, or it could be much more comprehensive, such as the use of a fully integrated Azure or Amazon AWS infrastructure. One of the main re
Publish At:2017-09-08 09:35 | Read:4657 | Comments:0 | Tags:Cloud Computing Cloud

Shrink Your Enterprise Cloud Computing Security Concerns With a Cloud Vendor Risk Management Program

According to a recent Forrester report, enterprise cloud computing adoption accelerated in 2016 and will do so again in 2017. Software-as-a-service (SaaS) remains the largest portion of the public cloud market, with global spending expected to reach $105 billion in 2017 and $155 billion by 2020. Infrastructure-as-a-service (IaaS) and platform-as-a-service (
Publish At:2017-08-22 09:30 | Read:6013 | Comments:0 | Tags:Cloud Security Risk Management Cloud Cloud Adoption Cloud Co

Best Practices for Developing and Securing a Microservices Architecture

Co-authored by Chris Craig. To match the ongoing shift to cloud as a means of increasing agility when delivering services, the architectures supporting these services are also evolving. The cloud IT space is full of terminology such as infrastructure-as-code, highly scalable architectures and microservices architecture — a methodology that is gathering sig
Publish At:2017-08-15 11:45 | Read:4462 | Comments:0 | Tags:Cloud Security Cloud Cloud Adoption Cloud Computing Cloud Se

Is Cloud Security a Safe Bet for Highly Sensitive Government Data?

Security is the primary focus of any government agency. One of the most obvious pitfalls of these agencies moving highly sensitive data to the cloud is that they surrender control to a third party. Moreover, nothing on the internet is truly secure, and all data is vulnerable to attacks and threats. The exposure footprint to those threats is staggering unde
Publish At:2017-07-28 21:55 | Read:5630 | Comments:0 | Tags:Cloud Security Data Protection Government Cloud Adoption Clo

Who Is Responsible for Cloud Security?

When implementing cloud projects, security is one of the most important issues. It requires companies to identify and understand the risks inherent to digitization, public networks and outsourcing of infrastructure components. Companies still fear that their data is insecure with cloud systems. IT professionals want to apply the same level of security to t
Publish At:2017-07-24 17:25 | Read:8689 | Comments:0 | Tags:Cloud Security Data Protection Identity & Access Cloud Cloud

Cloud Security Is Not an Either/Or

Now that cloud has become pervasive, organizations and individuals everywhere need to think about cloud security. To say that data is either fully secure or vulnerable in the cloud would be far too simplistic. Two Schools of Thought There are two widespread but opposite beliefs surrounding security in the public cloud: Abandon all hope! When you send dat
Publish At:2017-07-20 21:00 | Read:3940 | Comments:0 | Tags:Cloud Security Cloud Cloud Computing Data Breach Human Facto

Security Concerns Around Zombie Cloud Infrastructure

One of the most important benefits of the use of cloud instances over traditional network configurations is that one can be literally setup within seconds, by the click of a few buttons. This ability has dramatically reduced deployment times for test, model, and production systems. It also allows for great flexibility both from a technical and a billin
Publish At:2017-07-20 20:35 | Read:4063 | Comments:0 | Tags:Cloud Computing Cloud


Tag Cloud