Cloud
Securing the Future: Navigating the Complexities of Cloud Security
Cloud environments are complex, and can create a difficult territory for security and IT teams to monitor and comprehend ...
Security Boulevard
Top Ten NSA and CISA Cloud Security Strategies
Nik Hewitt | | advice, Best Practices, Cloud, Cybersecurity, Kubernetes Security, microsegmentation, next gen security, security, Security Research, TrueFort, zero trust
NSA and CISA release a joint guide outlining ten pivotal cloud security strategies for enterprise In a business world dominated by cloud-based solutions, robust cloud security strategies for cloud environments have never ...
Alyssa Miller: Charting the Course Through InfoSec and Aviation
Tom Eston | | Alyssa Miller, aviation, Business, career, CISO, Cloud, Cloud Security, conference, Cyber Security, Cybersecurity, Cybersecurity Industry, Data Privacy, Digital Privacy, Episodes, hacker, HR, Information Security, Infosec, jobs, Pilot, Podcast, Podcasts, Privacy, recruiting, security, technology, Weekly Edition
In this episode, special guest Alyssa Miller joins the hosts for an insightful and entertaining conversation covering a broad range of topics from social engineering anecdotes involving Kevin Johnson to Alyssa’s journey ...
Cloud Repatriation Impacts on Resources and Cybersecurity
Nik Hewitt | | advice, Best Practices, Cloud, Cybersecurity, lateral movement, microsegmentation, next gen security, security, Security Research, visibility, zero trust
The cloud repatriation surge and the impact on SOS resources and business cybersecurity In recent years, the cloud computing landscape has witnessed a significant yet somewhat surprising trend: cloud repatriation. This movement ...
FedRAMP ATO Prioritization for Generative AI Cloud Solutions
The US Government is continuing to move rapidly to ensure US competitiveness in the area of Artificial Intelligence (AI). The FedRAMP Program Management Office (PMO) published the Emerging Technology Prioritization Framework (ETPF) ...
You Can’t Stop What You Can’t See: Addressing Encrypted Cloud Traffic
Forget AI. The most immediate and threatening cybersecurity challenge is visibility into an organization’s encrypted cloud traffic ...
Security Boulevard
Security Flaw in CoCalc: One Click and Your Cloud is Ruined
TL;DR Imperva Threat Research discovered and reported a security flaw in the CoCalc Cloud environment. The flaw enabled potential attackers to completely take over a target’s account with only a single click ...
Maintaining Control and Visibility in Hybrid Environments
Nik Hewitt | | advice, Best Practices, Cloud, Cybersecurity, microsegmentation, next gen security, security, Security Research, service account protection, service accounts, visibility, zero trust
The challenges and solutions to maintaining control and visibility in hybrid environments Many organizations have transitioned to hybrid and multi-cloud deployments, with tens of thousands more businesses on the way. This shift, ...
Hackers Building AndroxGh0st Botnet to Target AWS, O365, Feds Warn
The bad actors behind the Androxgh0st malware are building a botnet they can use to identify victims and exploit vulnerable networks to steal confidential information from such high-profile cloud applications as Amazon ...
Security Boulevard
Understanding Cloud Workload Protection: Technologies and Best Practices
Implementing cloud workload protection strategies is essential for any organization utilizing cloud services. Here's what you need to know ...
Security Boulevard