HackDig : Dig high-quality web security articles for hackers

Securing Data in a Multicloud Environment

The multicloud environment is becoming the standard for businesses, with 93% of organizations using this approach, according to a Flexera 2020 State of the Cloud report. The public cloud services used in the multicloud strategy are gaining in popularity, with Gartner predicting revenue in 2020 will reach more than $266 billion. “Adoption of next-generation s
Publish At:2020-07-13 10:39 | Read:30 | Comments:0 | Tags:Cloud Security Security Intelligence & Analytics Cloud Cloud

Cloud Adoption Held Back by Data Loss and Compliance Fears

UK businesses have been slow to move to the cloud because of concerns over data loss and compliance breaches, according to the 2020 UK Veritas Databerg Report. It showed that just 47% of corporate data is currently stored in the cloud, despite IT decision makers believing 43% would be held in the cloud within 12 months during the last Databerg repo
Publish At:2020-07-10 13:05 | Read:216 | Comments:0 | Tags: Cloud

Huge DDoS Attack Launched Against Cloudflare in Late June

The 754 million packets-per-second peak was part of a four-day attack involving more than 316,000 sending addresses.Cloudflare revealed this week that on June 21 it detected and mitigated a packet-based volumetric DDoS attack that peaked at 754 million packets-per-second. According to researchers, that peak was part of a four-day attack from June 18-21 that
Publish At:2020-07-09 20:20 | Read:200 | Comments:0 | Tags: Cloud DDOS

Overcoming Data Security Challenges in a Hybrid, Multicloud World

Cloud computing is evolving at a rapid pace. Today, there’s a range of choices for moving applications and data to cloud that includes various deployment models from public and private to hybrid cloud service types. Organizations are seeking ways to utilize multiple clouds as part of a broader digital strategy. With a multicloud approach, companies can avoid
Publish At:2020-07-09 13:35 | Read:181 | Comments:0 | Tags:Cloud Security Data Protection Data Security Hybrid Cloud In

Microsoft Research Develops Invisible Cloud Malware Scanner

It's all very well having thousands of virtual machines running in the cloud, but how do you scan them for malware? Microsoft Research has developed a system called Project Freta to do just that. It has launched the project as a prototype for public use.Virtual machines (VMs) are software versions of computers that run in a cloud environment. They replic
Publish At:2020-07-07 17:23 | Read:223 | Comments:0 | Tags: Cloud

Visibility and Threat Detection in a Remote Working World

At the outset of the COVID-19 pandemic, when governments around the world put stay-at-home orders in place, it was hard to imagine the state of work would permanently change. Yet, as organizations rapidly adopted and expanded systems to enable a remote workforce — which doubled in size in just three weeks — company cultures began shifting, too. As employees
Publish At:2020-06-24 11:06 | Read:104 | Comments:0 | Tags:CISO Endpoint Security Intelligence & Analytics Threat Hunti

Three Approaches to Cybersecurity Planning for Post-Pandemic Cloud Adoption

The global pandemic has been dictating how the whole world is reforming, businesses included. Different forums and analyst reports are increasingly calling out the future of businesses as they are moving their workloads to the cloud gradually. IDC “expects 2021 to be the year of multi-cloud” as the global COVID-19 pandemic reinforces the need for business to
Publish At:2020-06-24 11:06 | Read:162 | Comments:0 | Tags:Cloud Security Risk Management Cloud Adoption Cybersecurity

Back to Basics with Cloud Permissions Management

By using the AAA permissions management framework for cloud operations, organizations can address authentication, authorization, and auditing. As I spend more time discussing the cloud with security customers and partners, it has made me think a lot about how the industry is continuously evolving to figure out new ways to layer on security and complexity whi
Publish At:2020-06-23 14:38 | Read:142 | Comments:0 | Tags: Cloud

5 Steps for Implementing Multicloud Identity

Why embracing, not fighting, decentralization will pave the way to smoother cloud migrations. According to the "RightScale State of the Cloud" report, virtually every company (84%) that uses infrastructure-as-a-service (IaaS) or platform-as-a-service (PaaS) clouds uses more than one provider. Most employ three or more public clouds from leading providers suc
Publish At:2020-06-23 10:46 | Read:165 | Comments:0 | Tags: Cloud

XORDDoS, Kaiji Botnet Malware Variants Target Exposed Docker Servers 

Insights and analysis by Augusto Remillano II With additional analysis by Patrick Noel Collado and Karen Ivy Titiwa We have recently detected variants of two existing Linux botnet malware types targeting exposed Docker servers; these are XORDDoS malware (detected by Trend Micro as Backdoor.Linux.XORDDOS.AE) and Kaiji DDoS malware (detected by Trend Micro as
Publish At:2020-06-23 02:01 | Read:106 | Comments:0 | Tags:Botnets Cloud botnet DDoS Docker Kaiji XORDDoS DDOS

Cloud Security Alliance Offers Tips to Protect Telehealth Data

As telehealth grows more common, security experts address the privacy and security concerns of storing health data in the cloud.The COVID-19 pandemic has pushed healthcare organizations to make telehealth a top priority. As they do, they're forced to confront privacy concerns related to information access, usage, and alteration, as well as the security of pu
Publish At:2020-06-19 17:59 | Read:224 | Comments:0 | Tags: Cloud

The COVID-19 Pandemic Dominates the Cybersecurity World

Cybersecurity is not a static world. You can say that it is a social system, it affects and is affected by its surrounding environment. For example, back in 2018, it was the GDPR that shook the foundations of security and privacy by making the protection of our personal data a fundamental human right. But that was then. What is shaping today’s cybersecurity?
Publish At:2020-06-18 00:31 | Read:225 | Comments:0 | Tags:Featured Articles IT Security and Data Protection AI Cloud C

TP-LINK Cloud Cameras NCXXX DelMultiUser Stack Overflow

Vulnerability title: TP-LINK Cloud Cameras NCXXX DelMultiUser Stack OverflowAuthor: Pietro OlivaCVE: CVE-2020-13224Vendor: TP-LINKProduct: NC200, NC210, NC220, NC230, NC250, NC260, NC450Affected versions: NC200 <= 2.1.10 build 200401, NC210 <= 1.0.10 build 200401, NC220 <= 1.3.1 build 200401, NC230 <= 1.3.1 build 200401,
Publish At:2020-06-16 14:11 | Read:295 | Comments:0 | Tags: Cloud

IBM Acquires Cloud Security Company Spanugo

IBM has announced a definitive agreement to acquire cloud cybersecurity posture management solutions provider Spanugo.Founded in 2017, the Santa Clara, California-based Spanugo aims to help organizations protect IT assets across the enterprise hybrid cloud, through automating resource discovery, configuration analysis and management, and the implementation o
Publish At:2020-06-16 14:10 | Read:122 | Comments:0 | Tags:NEWS & INDUSTRY Cloud Security Management & Strategy

SD-WAN is the Cloud Security of Choice for Half of UK Businesses

Software-defined wide area network (SD-WAN) is the cloud security solution of choice for around half (49%) of UK businesses, who have either deployed it or are planning to do so in the next 12 months, according to a report by Barracuda Networks.The research also found this approach is being used by 27% of UK decision makers, who have added security to their
Publish At:2020-06-11 15:56 | Read:101 | Comments:0 | Tags: Cloud


Share high-quality web security related articles with you:)