HackDig : Dig high-quality web security articles for hacker

Cloud Security Lessons from the RNC Leak

A poorly configured Amazon S3 bucket that led to a massive data leak could easily happen to any organization not adopting proper cloud security measures.This week's leak of Republican National Committee voter data - one of the largest known voter data leaks in the US - exposed dangerous cloud security missteps that should serve as a cautionary tale for busin
Publish At:2017-06-23 00:15 | Read:119 | Comments:0 | Tags: Cloud

RNC Voter Data on 198 Million Americans Exposed in the Cloud

One of the largest known US voter data leaks compromised personal information via an unsecured public-storage cloud account set up on behalf of the Republican National Committee.Millions of voter records containing personal information and "modeled" voter information like religion and race were leaked from an unsecured public storage cloud account owned by D
Publish At:2017-06-19 22:35 | Read:356 | Comments:0 | Tags: Cloud

Forrester: Rapid Cloud Adoption Drives Demand for Security Tools

Cloud services revenue is poised to skyrocket from $114 billion in 2016 to $236 billion by 2020, driving the market for products to secure data in the cloud.The global cloud services market is poised to skyrocket from $114 billion in 2016 to $236 billion by 2020. Its rapid growth is driving the market for cloud security tools, which will increase from $1 bil
Publish At:2017-06-16 20:55 | Read:202 | Comments:0 | Tags: Cloud

Climbing the Security Maturity Ladder in Cloud

These five steps will insure that you achieve the broadest coverage for onboarding your most sensitive workloads.Astute CIOs are actively migrating to public cloud to take advantage of scalability, flexibility and inherent security at a lower cost. As Rob Alexander, CIO Capital One, said at the AWS re:Invent 2015 conference in Las Vegas, "We can provide high
Publish At:2017-06-16 02:30 | Read:248 | Comments:0 | Tags: Cloud

Digital Transformation Means Infusing Identity Everywhere

Organizations are rapidly adopting new technologies such as cloud, mobile and the Internet of Things (IoT) to facilitate and accelerate digital transformation. Securing these environments means managing identities throughout the organization, and next-generation identity and access management (IAM) strategies must give IT the ability to swiftly enable cloud,
Publish At:2017-06-14 01:00 | Read:187 | Comments:0 | Tags:Cloud Security Identity & Access Access Management Cloud Clo

NetFlow Data Collection in Cloud Systems

The value of NetFlowWithin a network, connectivity is everything, but within a secure network, visibility is also everything. NetFlow data can provide both these requirements. NetFlow is a Cisco proprietary technology which allows for the collection of metadata generated by the traffic (flow) within a network. This metadata is invaluable for capacity p
Publish At:2017-06-12 11:45 | Read:257 | Comments:0 | Tags:Cloud Computing Cloud

Cloud, Hackers, Trump Presidency, Drive Security Spend

Businesses reevaluate their security spending in response to the growth of cloud, fear of malicious hackers, and the Trump presidency, research finds.Security leaders have cloud security, malicious hackers, and the Trump presidency at top of mind as they determine how to allocate security spend in 2017. Larger security budgets will go toward cloud, network,
Publish At:2017-06-07 15:55 | Read:236 | Comments:0 | Tags: Cloud

Docker Enterprise Edition Now on G-Cloud 9 Framework

  Docker Enterprise Edition (EE) has been accepted to G-Cloud 9, further exemplifying Docker’s commitment to delivering tools for application modernization and innovation across the UK public sector. G-Cloud 9 is the UK government’s latest framework that is designed to simplify and accelerate adoption of cloud-based services within the public sector. The inc
Publish At:2017-06-06 08:45 | Read:254 | Comments:0 | Tags:Docker Orchestration Partners Releases Security docker Docke

EnGenius EnShare IoT Gigabit Cloud Service 1.4.11 Root Remote Code Execution

Title: EnGenius EnShare IoT Gigabit Cloud Service 1.4.11 Root Remote Code Execution Advisory ID: ZSL-2017-5413 Type: Local/Remote Impact: System Access Risk: (5/5) Release Date: 04.06.2017Summary With the EnGenius IoT Gigabit Routers and free EnShare app, use your iPhone,
Publish At:2017-06-03 20:25 | Read:280 | Comments:0 | Tags: Cloud

DLP in the Cloud

Posted under: Research and Analysis It’s been quite a while since we updated our Data Loss Prevention (DLP) research. It’s not that DLP hasn’t continued to be an area of focus (it has), but a bunch of other shiny things have been demanding our attention lately. Yeah, like the cloud. Well, it turns out a lot of organizations are using th
Publish At:2017-05-31 06:35 | Read:232 | Comments:0 | Tags: Cloud

Using Security Intelligence to Detect Insider Threats From Cloud-Based Applications

Microsoft Office 365 is popular — very popular. In 2016, Gartner reported that 78 percent of enterprises surveyed used or planned to use Office 365. With access to a range of user activity events from a variety of sources, including Exchange Online, SharePoint Online and Azure Directory, how can Office 365 administrators correlate all this valuable data wit
Publish At:2017-05-26 08:10 | Read:330 | Comments:0 | Tags:Cloud Security Data Protection Identity & Access Security In

82% of Databases Left Unencrypted in Public Cloud

Personal health information and other sensitive data is left exposed as businesses overlook encryption and network security.The average lifespan of a cloud resource is 127 minutes. Traditional security strategies can't keep up with this rate of change, and 82% of databases in the public cloud are left unencrypted.These findings come from the RedLock Cloud Se
Publish At:2017-05-26 02:15 | Read:273 | Comments:0 | Tags: Cloud

NDAY-2017-0101: iCloud Information Leak

By: Zuk Avraham Follow Zuk Avraham (@ihackbanme) Nicolas Trippar Follow Nicolas Trippar (@ntrippar) zNID: NDAY-2017-0101 CVE: Unknown Type: Information Disclosure Platform: iOS < 10.3 Device type: iPhone, iPod iOS bulletin: https://support.apple.com/en-us/HT207617 Public release date: 25th of May, 2017 Credit: Anonymous Download Exploit (passwor
Publish At:2017-05-25 16:50 | Read:364 | Comments:0 | Tags:iOS Mobile security Mobile Threat Defense N-Day Threat Resea

Multi-cloud Key Management Research Paper

Posted under: Research and Analysis Cloud computing is the single biggest change to computing we have seen, fundamentally changing how we use computing resources. We have reached a point where multi-cloud support is a reality for most firms; SaaS and private clouds are complimented by public PaaS and IaaS. With these changes we have received an increasin
Publish At:2017-05-25 03:15 | Read:246 | Comments:0 | Tags: Cloud

Zombie Cloud Data: What Your Delete Key May Not Delete

The convenience and flexibility of the cloud has transformed data storage for organizations and individual users alike. Cloud storage is especially useful for data that must be shared among multiple users or multiple devices. But for all its convenience, the cloud also adds a new complexity to the old security challenge of making sure that deleted data is
Publish At:2017-05-24 00:45 | Read:313 | Comments:0 | Tags:Cloud Security Data Protection Cloud Cloud Services Provider


Share high-quality web security related articles with you:)


Tag Cloud