Human error and misconfigurations primary source of Kubernetes security snafus, report says

StackRox, a provider of cloud-native, container and Kubernetes security, warned in its previous report that the security implications for Kubernetes were beginning to spill over to adoption – and the release of its updated winter study have proved the company right.

The paper, the winter edition of its State of Container and Kubernetes Security Report, was put together alongside 451 Research and polled more than 500 industry...

By James Bourne, 21 February 2020, 0 comments. Categories: Containers, Data Loss, Developers, Kubernetes, Legal, Platform, Research, Security, Vulnerabilities.

Netskope secures $340m in funding at $3bn valuation to further cloud security mission

Cloud security provider Netskope has announced the closure of a $340 million (£263m) investment on a valuation of almost $3 billion.

The move represents the seventh funding round for the Santa Clara-based company, taking its total funding to more than $740m. Netskope’s most recent funding was a series F round

By James Bourne, 07 February 2020, 0 comments. Categories: Data & Analytics, Data Management, Economy, Security, Vulnerabilities.

The top 10 cybersecurity companies to watch in 2020: How AI and ML is a key differentiator

  • Worldwide spending on information security and risk management systems will reach $131bn in 2020, increasing to $174bn in 2022 approximately $50bn will be dedicated to protecting the endpoint according to Gartner’s latest information security and risk management forecast
  • Cloud security platform and application sales are predicted to grow from $636m in 2020 to...

By Louis Columbus, 05 February 2020, 0 comments. Categories: Data & Analytics, Data Management, Security, Software, Vulnerabilities.

Organisations struggling with sensitive cloud data as they shun security-first approach

Corporate data may be reaching a tipping point in the cloud – but security policies are yet to follow it.

That is the key finding from a new report by security provider Thales. The study, which was put together by the Ponemon Institute and which polled more than 3,000 IT and IT security practitioners across eight countries, found that while almost half (48%) of corporate data was in the cloud, less than a third (32%) of...

By James Bourne, 10 October 2019, 0 comments. Categories: Data & Analytics, Data Management, Research, Security, Vulnerabilities.

Eradicate human error and make your cloud implementation a picnic

Sunshine, sandwiches, scenic views, and not a care in the world besides the occasional wasp. Everyone loves a picnic.

Unfortunately, the same cannot be said for PICNIC, an enduring acronym in IT circles standing for Problem In Chair, Not In Computer. The term, dating back to the 1980s, was first employed by frustrated IT professionals weary of dealing with computer problems arising from user error rather than any actual issues with the...

By Matt Lock, 08 October 2019, 0 comments. Categories: Data Loss, Data Management, Infrastructure, Security, Vulnerabilities.

Three reasons why killing passwords will improve your cloud security

By Louis Columbus, 27 September 2019, 0 comments. Categories: Data Management, Security, Software, Vulnerabilities.

How does privileged access security work on AWS and other public clouds?

Bottom line: Amazon’s Identity and Access Management (IAM) centralises identity roles, policies and Config Rules yet doesn’t go far enough to provide a Zero Trust-based approach to Privileged Access Management (PAM) that enterprises need today.

AWS provides a baseline level of support for Identity and Access Management at no charge as part of their AWS instances, as do other public cloud providers. Designed to provide customers with...

By Louis Columbus, 27 August 2019, 0 comments. Categories: Amazon, Data Management, Infrastructure, Public, Security, Vulnerabilities.

Cloud Security Alliance publishes ‘egregious 11’ list of top threats to the cloud

If one other thing besides death and taxes is certain, it is that cloud security will remain a key talking point. Whose responsibility is it exactly – and why does the shared responsibility model continue to cause havoc?

Some areas however can be nailed down much more solidly. The Cloud Security Alliance (CSA) has issued what it calls the ‘egregious 11’ in its latest report, giving organisations an up-to-date...

By James Bourne, 19 August 2019, 0 comments. Categories: Architecture, Infrastructure, Research, Security, Vulnerabilities.

What’s in your cloud? Key lessons to learn after the Capital One breach

The lack of visibility into the expanded cloud attack surface is a fast-growing problem that is only getting worse. Although we have seen misconfigurations in the cloud before, the Capital One breach is a sobering reality check for the security industry. We need to vastly improve threat detection and response in cloud environments.

The attack behaviours associated with the Capital One breach that occurred in March 2019 are...

By Chris Morales, 16 August 2019, 0 comments. Categories: Amazon, Data Management, Security, Vulnerabilities.