Cloud Security | News, how-tos, features, reviews, and videos
Orca Security’s analysis of major cloud infrastructure reveals widespread use of tools with known vulnerabilities, exposed AI models and data, misconfigured systems, and unencrypted data — all to capitalize quickly on AI.
An analyst says it could allow CISOs to better enforce security policies by decoupling security policies from the complexities of network configurations.
Yes, the shared responsibility model long predates the cloud, but the cloud era is proving that true sharing of responsibility is more complicated than it seems, leaving enterprises less secure as a result.
With the typical enterprise today leveraging a dozen cloud vendors globally, there are plenty of ways for security nightmares to sneak in. Here are a few lesser-known issues that could haunt you.
Primary code repositories are a godsend for software developers but offer easy access for threat actors to deliver malware. Experts say CISOs should scan for threats and be aware of the dangers.
Attackers can gain access to AWS accounts or sensitive data by creating in advance S3 storage buckets with predictable names that will be automatically used by various services and tools.
Nation-state threat groups are piling on attack techniques seen as successful in exploiting free cloud services.
This year’s Black Hat USA sees LLMs in the crosshairs, rising attacks against hyperscale cloud vendors, and CISOs in need of advice for legal liabilities.
Artificial intelligence is altering not only the threat landscape but also how security teams can defend their organizations. But AI isn’t the only trend cybersecurity pros should be on top of.
Dark and threatening, an insecure cloud should never be ignored. Here’s a rundown of the top threats you need to look out for.