HackDig : Dig high-quality web security articles for hackers

Zscaler Acquires Microsegmentation Firm Edgewise Networks

Cloud security firm Zscaler has acquired Edgewise Networks, a company that helps customers secure application-to-application communications using a zero-trust approach through microsegmentation.The acquisition was announced on Thursday and terms of the deal were not disclosed.Founded by Peter Smith and Harry Sverdlove in the Spring of 2016 with the belief th
Publish At:2020-06-01 13:46 | Read:57 | Comments:0 | Tags:NEWS & INDUSTRY Cloud Security

Advocating Security Fundamentals During and After COVID-19

The COVID-19 health crisis almost instantly changed how the world works, bringing with it new security threats and challenges. As organizations work to find the path forward and emerge stronger on the other side, it’s important to take stock of where we are and where we need to be. Working Together While Apart Like many other organizations, ours transitioned
Publish At:2020-05-29 13:31 | Read:124 | Comments:0 | Tags:CISO Cloud Security remote workforce Zero Trust Cyber Resili

Five Common Data Security Pitfalls: Do You Know How to Avoid Them?

Data security is on everyone’s mind these days, and for good reason. The number of successful data breaches is growing thanks to the increased attack surfaces created by more complex IT environments, widespread adoption of cloud services and the increasingly sophisticated nature of cybercriminals. One part of this story that has remained consistent over the
Publish At:2020-05-24 06:18 | Read:107 | Comments:0 | Tags:Data Protection Cloud Security Compliance Data Breach Data S

Why Security Orchestration, Automation and Response (SOAR) Is Fundamental to a Security Platform

Security teams today are facing increased challenges due to the “new normal” created by the recent global health crisis. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees must move to a virtual security operations center (SOC) model while address
Publish At:2020-05-24 06:18 | Read:119 | Comments:0 | Tags:CISO Cloud Security Incident Response Automation Cloud Servi

The Connection Between Cloud Service Providers and Cyber Resilience

Organizations in both the private and public sectors have increasingly turned to cloud service providers (CSPs) to support their technical infrastructure, primarily to reduce IT costs and increase the efficiency of computing resources. In many cases, CSPs can also offer protection from security threats and increased cyber resilience — though customers often
Publish At:2020-05-24 06:18 | Read:99 | Comments:0 | Tags:Cloud Security Cloud Cloud Services Cloud Services Provider

Venafi Acquires Kubernetes Services Provider Jetstack

Identity protection provider Venafi this week announced that it has entered a definitive agreement to acquire Jetstack, a company specializing in open source machine identity protection software for Kubernetes.Founded in 2000, Utah-based Venafi provides solutions for securing and protecting cryptographic keys and digital certificates. The company helps both
Publish At:2020-05-18 13:56 | Read:335 | Comments:0 | Tags:NEWS & INDUSTRY Cloud Security Management & Strategy

A week in security (April 27 – May 3)

Last week on Malwarebytes Labs, we looked at how secure the cloud is, understood why unexpected demand can influence an organization to consider their “just in time” (JIT) system, speculated on why the threat actors behind the Troldesh ransomware suddenly released thousands of decryption keys, preached the good news about VPN being mainstream, touched on the
Publish At:2020-05-18 13:43 | Read:139 | Comments:0 | Tags:Malwarebytes news Apple APT awis bluetooth bluetooth attack

Cloud data protection: how to secure what you store in the cloud

The cloud has become the standard for data storage. Just a few years ago, individuals and businesses pondered whether or not they should move to the cloud. This is now a question of the past. Today, the question isn’t whether to adopt cloud storage but rather how. Despite its rapid pace of adoption, there are some lingering concerns around cloud sto
Publish At:2020-05-03 14:39 | Read:329 | Comments:0 | Tags:How-tos cloud cloud data cloud data protection cloud securit

Safeguard Sensitive Data With a Next-Generation Data Security Approach

There is no silver bullet when it comes to protecting sensitive data. No single security technology investment will eliminate the risk of data theft or a mistake exposing sensitive information. To proactively defend against attackers, enterprise security teams are learning that they need to collect and centralize security and compliance information from all
Publish At:2020-05-03 08:13 | Read:216 | Comments:0 | Tags:Data Protection Cloud Cloud Infrastructure Cloud Security Co

Google Launches Cloud-Based Remote Access Solution

Google this week announced the availability of a cloud-based solution meant to help work-from-home employees securely access enterprise resources.The newly launched BeyondCorp Remote Access is based on a zero-trust model and provides employees with the ability to remotely access internal web apps from almost any device, from anywhere, even without the use of
Publish At:2020-04-21 09:35 | Read:459 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Identity & Access Cl

Zscaler to Acquire Cloudneeti to Solve Cloud Misconfiguration Problems

San Jose, Calif.-based cloud security firm Zscaler (NASDAQ: ZS) said it will acquire Redmond, Wash.-based startup Cloudneeti for an undisclosed sum. Cloudneeti offers cloud security posture management to prevent and remediate misconfigurations in SaaS, IaaS and PaaS."Cloudneeti augments Zscaler's data protection capabilities and will dramatically improve org
Publish At:2020-04-13 12:05 | Read:370 | Comments:0 | Tags:NEWS & INDUSTRY Cloud Security Cloud

Take a Data-Centric Approach to Zero Trust to Protect Your Most Critical Assets

For many of us, children are our most critical assets. In order to protect what is important to us, we work hard to know where they are and what they are doing at all times — particularly during those pesky teen years. We also take steps to protect the places where they spend their time. We install cameras, locks and alarm systems to monitor activity and sec
Publish At:2020-04-13 06:40 | Read:472 | Comments:0 | Tags:Data Protection digital trust Cloud Cloud Security Critical

Hackers Can Compromise VMware vCenter Server Via Newly Patched Flaw

VMware has patched a critical vulnerability that can be exploited to compromise vCenter Server or other services that rely on the Directory Service for authentication.The flaw, tracked as CVE-2020-3952 with a CVSS score of 10, was disclosed by VMware on Thursday. The virtualization giant learned of its existence from a researcher who has not been named in th
Publish At:2020-04-10 12:14 | Read:367 | Comments:0 | Tags:NEWS & INDUSTRY Cloud Security Vulnerabilities

RigUp Database Exposed 76,000 Files From U.S. Energy Sector

An exposed Amazon Web Services (AWS) S3 bucket belonging to RigUp was found to expose tens of thousands of private files belonging to organizations and individuals in the U.S. energy sector, vpnMentor reports.Founded in 2014, United States-based RigUp is a labor marketplace and services provider for the country’s energy sector. The software company connects
Publish At:2020-04-10 08:22 | Read:616 | Comments:0 | Tags:NEWS & INDUSTRY Privacy Cloud Security Data Protection P

Why Hybrid Cloud Environments Require More Than Just First-Generation IDaaS Solutions

Every organization around the world is on a journey to cloud, each one facing the need to reinvent themselves with engaging omnichannel digital experiences to remain relevant in a hyper-competitive market. At the core of supporting a hybrid cloud environment is the need for a strong Identity and Access Management (IAM) program. But, embarking on any Identity
Publish At:2020-04-09 18:06 | Read:493 | Comments:0 | Tags:CISO Cloud Security Identity & Access Chief Information Secu

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud