Cloud Security | News, how-tos, features, reviews, and videos
The AMBERSQUID cryptojacking campaign exploits cloud services without triggering AWS approval processes.
Cisco’s new addition to its Full-Stack Obervability Platform aims to help prevent cybersecurity vulnerabilities during development of cloud-native or hybrid applications.
Orca Security’s new search tool takes natural language queries to hunt for Log4j-like vulnerabilities.
CISOs also say they want better third-party risk management, AI security, and human error/insider risk reduction solutions.
The enhancements are designed to better protect sensitive data, harden admin access controls, and provide more flexibility on where data is stored and processed.
Microsoft’s cloud services have come under scrutiny in recent months, with APIs at the heart of the matter. Here are some strategies to help mitigate security issues that can arise when using APIs.
Technology reduces risks of data exposure and can be used with AWS Key Management Service, Microsoft Azure Key Vault, and Google Cloud Key Management Service.
Vulnerabilities affect data center services commonly used by organizations and could be exploited by attackers to gain system access and perform remote code execution.