HackDig : Dig high-quality web security articles for hackers

Adaptive Shield Emerges From Stealth to Secure SaaS Applications

With $4 million in seed funding, Adaptive Shield this week emerged from stealth mode to automate the security of software-as-a-service (SaaS) applications.The Tel Aviv, Israel-based startup seeks to tackle the issue of incorrect configuration of SaaS applications, which can expose them to cyberattacks, data leaks, and other risks.SaaS security configuration
Publish At:2020-08-14 16:12 | Read:56 | Comments:0 | Tags:NEWS & INDUSTRY Application Security Cloud Security Mana

SASE Provider Perimeter 81 Raises $40 Million

Secure Access Service Edge (SASE) and Network-as-a-Service (NaaS) solutions provider Perimeter 81 has closed a $40 million Series B funding round that brings the total raised by the company to $65 million.Founded in 2018 and headquartered in Tel Aviv, Israel, the startup provides a cloud-based Security-as-a-Service (SaaS) solution that aims to secure access
Publish At:2020-08-13 00:19 | Read:84 | Comments:0 | Tags:Network Security NEWS & INDUSTRY Application Security Id

SecurityWeek to Host Virtual Cloud Security Summit on August 13, 2020

SecurityWeek will host its 2020 Cloud Security Summit virtual event on Thursday, August 13, 2020.Through a fully immersive virtual environment, attendees will be able to interact with leading solution providers and other end users tasked with securing various cloud environments and services.SecurityWeek’s Cloud Security Summit will help organizations learn h
Publish At:2020-08-12 12:44 | Read:84 | Comments:0 | Tags:NEWS & INDUSTRY Cloud Security Cloud

Survey: 76% of IT Pros Say It’s Difficult to Maintain Security Configs in the Cloud

Cloud misconfigurations are no laughing matter. In its “2020 Cloud Misconfigurations Report,” DivvyCloud revealed that 196 separate data breaches involving cloud misconfigurations had cost companies a combined total of approximately $5 trillion between January 1, 2018 and December 31, 2019. The problem is that those costs could be even higher; as
Publish At:2020-08-12 09:49 | Read:114 | Comments:0 | Tags:Cloud Featured Articles cloud security configuration Survey

Data Security Company Symmetry Systems Emerges From Stealth

Symmetry Systems, a provider of data store and object security (DSOS) solutions, emerged from stealth mode on Tuesday with $3 million in seed funding from ForgePoint Capital and Prefix Capital.Symmetry Systems was founded by Mohit Tiwari, a former cybersecurity professor at the University of Texas, and Casen Hunger, one of Tiwari’s former students. The compa
Publish At:2020-08-11 09:30 | Read:85 | Comments:0 | Tags:NEWS & INDUSTRY Identity & Access Cloud Security Dat

Loving the Algorithm: User Risk Management and Good Security Hygiene

User risk management watches where people can’t. If you polled a random sampling of employees at various organizations, most would probably consider themselves security-minded. They would argue that they are not actively sending sensitive data to malicious recipients, clicking strange links or downloading attachments from unknown senders. This mindset
Publish At:2020-08-07 09:04 | Read:190 | Comments:0 | Tags:Endpoint Mobile Security Cloud Security Insider Threat Risk

Cloud IAM and the Path Toward Digital Transformation

By 2022, 40% of global midsize and larger organizations will use identity and access management (IAM) capabilities delivered as software-as-a-service (SaaS) to fulfill most of their needs, cites a 2019 Gartner press release on IAM technology trends. Today, businesses are aligning themselves with a digital ecosystem by moving toward cloud adoption. On the jo
Publish At:2020-08-07 09:04 | Read:134 | Comments:0 | Tags:Cloud Security Identity & Access Access Management Cloud Hyb

Security Modernization for the Cloud

This is the first in a blog series that will focus on all phases of security delivery: design, dev/build, test, deploy, operate and learn.  Many organizations are facing new cybersecurity concerns as they look to accelerate their digital transformations for themselves and their customers. At the same time, information technology (IT) and operations are
Publish At:2020-08-06 09:54 | Read:99 | Comments:0 | Tags:CISO Cloud Security Chief Information Security Officer (CISO

Takeaways From the "CryptoForHealth" Twitter Hack

On July 15th, US-based microblogging and social networking service, Twitter, disclosed a security incident whose full impact has yet to be determined. According to court documents, the attack started around May 3rd and was only discovered in July when accounts belonging to well-known public figures and executives like Jeff Bezos, Bill Gates, Warren Buffet, P
Publish At:2020-08-05 07:51 | Read:85 | Comments:0 | Tags:INDUSTRY INSIGHTS Identity & Access Cloud Security

DDoS Attacks Increase in Size, Frequency and Duration

Distributed denial of service (DDoS) attacks are increasing in size, frequency and duration. Kaspersky Lab reported a doubling of DDoS attacks in the first quarter of 2020 compared with the fourth quarter of 2019, plus an 80% jump compared with the same quarter last year. Kaspersky also found that DDoS cyberattacks are increasing in duration. Average attack
Publish At:2020-07-30 19:37 | Read:101 | Comments:0 | Tags:Advanced Threats Application Security Cloud Security Data Pr

Identity and Data Protection Provider Ermetic Raises $17 Million

Identity and access protection provider Ermetic this week announced that it secured $17.25 million in a Series A funding round, which brings the total amount raised by the company to $27.3 million.Founded in 2019, the company provides protection for identities and data in the cloud, through access policy and continuous visibility. Ermetic enforces least
Publish At:2020-07-29 11:37 | Read:129 | Comments:0 | Tags:NEWS & INDUSTRY Cloud Security

5 Core Tenets for Effective Multicloud Security

For a growing number of organizations adopting cloud-based deployment models, the cloud security challenge is clear. For example, how do I rapidly transform my business in a way that is also secure and compliant? Business leaders have an opportunity to rethink securing their enterprise during the sea-change shift toward cloud models. For instance, leade
Publish At:2020-07-24 09:11 | Read:157 | Comments:0 | Tags:Cloud Security Artificial Intelligence (AI) Cloud Hybrid Clo

Why Cyber Ranges Are Effective To Train Your Teams

Cyber ranges may be one of the most effective ways to train IT professionals in defending against cyber attacks. The virtual environments deliver simulated real-world attacks that test multiple dimensions and stakeholders within diverse environments. Cybersecurity teams can use cyber ranges to practice defending against simulated threats in immersive trainin
Publish At:2020-07-20 08:40 | Read:197 | Comments:0 | Tags:Advanced Threats Incident Response Cloud Security Cybersecur

Mitigating Container Risk Requires a Comprehensive Approach

Containers have become a staple among large banks and financial services firms, which have used the technology in production. It has captured the attention of the broader market, that hopes to achieve the same technology benefits of improved application delivery and run-time efficiencies. This modular plug-and-play architecture is more scalable and can deliv
Publish At:2020-07-17 14:07 | Read:200 | Comments:0 | Tags:Banking & Financial Services Cloud Security Data Protection

Google Cloud Unveils New Service for Government Workloads

Google this week announced Assured Workloads for Government, a new Google Cloud service meant to address some of the unique challenges faced by government organizations adopting cloud technologies.Aimed at government contractors, suppliers and customers, the service helps them achieve security and compliance requirements for running government workloads, whi
Publish At:2020-07-16 10:54 | Read:145 | Comments:0 | Tags:NEWS & INDUSTRY Cloud Security Cloud

Tools

Tag Cloud

Keywords