Organisations struggling with sensitive cloud data as they shun security-first approach

Corporate data may be reaching a tipping point in the cloud – but security policies are yet to follow it.

That is the key finding from a new report by security provider Thales. The study, which was put together by the Ponemon Institute and which polled more than 3,000 IT and IT security practitioners across eight countries, found that while almost half (48%) of corporate data was in the cloud, less than a third (32%) of...

By James Bourne, 10 October 2019, 0 comments. Categories: Data & Analytics, Data Management, Research, Security, Vulnerabilities.

Eradicate human error and make your cloud implementation a picnic

Sunshine, sandwiches, scenic views, and not a care in the world besides the occasional wasp. Everyone loves a picnic.

Unfortunately, the same cannot be said for PICNIC, an enduring acronym in IT circles standing for Problem In Chair, Not In Computer. The term, dating back to the 1980s, was first employed by frustrated IT professionals weary of dealing with computer problems arising from user error rather than any actual issues with the...

By Matt Lock, 08 October 2019, 0 comments. Categories: Data Loss, Data Management, Infrastructure, Security, Vulnerabilities.

Three reasons why killing passwords will improve your cloud security

By Louis Columbus, 27 September 2019, 0 comments. Categories: Data Management, Security, Software, Vulnerabilities.

How does privileged access security work on AWS and other public clouds?

Bottom line: Amazon’s Identity and Access Management (IAM) centralises identity roles, policies and Config Rules yet doesn’t go far enough to provide a Zero Trust-based approach to Privileged Access Management (PAM) that enterprises need today.

AWS provides a baseline level of support for Identity and Access Management at no charge as part of their AWS instances, as do other public cloud providers. Designed to provide customers with...

By Louis Columbus, 27 August 2019, 0 comments. Categories: Amazon, Data Management, Infrastructure, Public, Security, Vulnerabilities.

Cloud Security Alliance publishes ‘egregious 11’ list of top threats to the cloud

If one other thing besides death and taxes is certain, it is that cloud security will remain a key talking point. Whose responsibility is it exactly – and why does the shared responsibility model continue to cause havoc?

Some areas however can be nailed down much more solidly. The Cloud Security Alliance (CSA) has issued what it calls the ‘egregious 11’ in its latest report, giving organisations an up-to-date...

By James Bourne, 19 August 2019, 0 comments. Categories: Architecture, Infrastructure, Research, Security, Vulnerabilities.

What’s in your cloud? Key lessons to learn after the Capital One breach

The lack of visibility into the expanded cloud attack surface is a fast-growing problem that is only getting worse. Although we have seen misconfigurations in the cloud before, the Capital One breach is a sobering reality check for the security industry. We need to vastly improve threat detection and response in cloud environments.

The attack behaviours associated with the Capital One breach that occurred in March 2019 are...

By Chris Morales, 16 August 2019, 0 comments. Categories: Amazon, Data Management, Security, Vulnerabilities.

Skybox and Zscaler team up for stronger cloud firewall integration

If there is one thing safer than a cloud security provider, it is two cloud security providers – in theory, at least. Zscaler and Skybox Security are coming together to connect two of their products for greater end-to-end protection.

The two companies will combine Zscaler’s Cloud Firewall product with the Skybox Security Suite, which encompasses visibility, vulnerability control, as well as firewall and network...

By James Bourne, 05 August 2019, 0 comments. Categories: Data Management, Security, Vulnerabilities.

McAfee notes gap between cloud competence and transformation – with CASBs key to success

It is another case of mind the gap, according to McAfee: while the vast majority of companies are seeing some level of business acceleration through their cloud initiatives, only a fraction are exploiting its full potential.

The security provider has released a special edition of its Cloud and Risk Adoption Report, which polled 1,000 enterprise organisations worldwide alongside collating data from anonymised cloud events across its...

By James Bourne, 21 June 2019, 0 comments. Categories: Data & Analytics, Infrastructure, Research, Security, Vulnerabilities.

How to prevent AIOps from becoming just another cog in the machine

Over the past few years, companies have been rapidly transitioning to dynamic, hybrid cloud environments in a bid to keep up with the constant demand to deliver something new. However, while the cloud provides the agility businesses crave, the ever-changing nature of these environments has generated unprecedented levels of complexity for IT teams to tackle.

Traditional performance management strategies have been stretched to...

How leveraging APIs will help to enable comprehensive cloud security

Cloud computing has utterly transformed the IT industry, requiring organisations to make fundamental changes to how they design, deploy, manage and optimise their security strategy. Many organisations, however, are simply using the same security model they have relied on for over a decade in their traditional networks to the cloud. But true cloud security requires more than deploying isolated cloud-enabled network security tools to protect cloud-based resources.

The future...

By Lior Cohen, 24 May 2019, 0 comments. Categories: Data & Analytics, Developers, Security, Vulnerabilities.

Cloud providers are under attack - and sabotaged services will freeze operations

Over the next two years, cloud service providers will be systematically sabotaged by attackers aiming to disrupt critical national infrastructure (CNI) or cripple supply chains. Organisations dependent on cloud services will find their operations and supply chains undermined when key cloud services go down for extended periods of time.

Nation states that engage in a digital cold war will aim to disrupt economies and take down CNI by sabotaging cloud infrastructure through traditional physical attacks or by...

Do cryptographic keys belong in the cloud?

Thanks to the cloud, organisations of all sizes can enjoy scalability, ease of use, and significant savings by outsourcing hardware and software ownership and maintenance in multi-tenant environments. Medium-sized companies no longer have to pay to build their own infrastructure, which makes the cloud especially appealing to this market.

However, the cloud still suffers from security issues....

By Brian Jenkins, 24 January 2019, 0 comments. Categories: Data & Analytics, Security, Vulnerabilities.

Predicting the future of next-gen access and Zero Trust Security in 2019: Challenges ahead

Bottom line:  The most valuable catalyst all digital businesses need to continue growing in 2019 is a Zero Trust Security (ZTS) strategy based on Next-Gen Access (NGA) that scales to protect every access point to corporate data, recognising that identities are the new security perimeter.

The faster any digital business is growing, the more identities, devices and network endpoints proliferate. The most successful businesses of 2019 and beyond are actively creating entirely new digital business models today....

By Louis Columbus, 22 January 2019, 0 comments. Categories: Data & Analytics, Privacy, Security, Vulnerabilities.

New malware strain can evade and uninstall cloud security software, researchers warn

The good news: your organisation has finally gotten around to installing some top of the range cloud security tools. The bad news: malware has been developed which can evade detection from them.

The nefarious discovery from threat actor Rocke was made by Palo Alto Networks Unit 42, with the security researchers noting that it was ‘to the best of [their] knowledge the first malware family that developed the unique capability to target and...

By James Bourne, 18 January 2019, 0 comments. Categories: Blockchain, Infrastructure, Security, Vulnerabilities.

AWS launches new security offering which mitigates S3 misconfigurations – if customers get it right

Amazon Web Services (AWS) has announced extra steps to ensure customers’ S3 buckets don’t become misconfigured – but don’t assume responsibility has been taken away from the customer.

The new service, Amazon S3 Block Public Access, can work at the account level, on individual buckets, as well as future buckets created. Users can also block existing public access, or ensure public access is not available for...

By James Bourne, 20 November 2018, 0 comments. Categories: Amazon, Data Loss, Data Management, Security, Vulnerabilities.

A guide to the key principles of chaos engineering

Chaos engineering can be defined as experiments over a distributed system at scale, which increases the confidence that the system will behave as desired and expected under undesired and unexpected conditions.

The concept was popularised initially by Netflix and its Chaos Monkey approach. As the company put it as far back as 2010: "The...

By Nazareno Feito, 12 November 2018, 0 comments. Categories: Architecture, Disaster Recovery, Infrastructure, SLA, Vulnerabilities.

How to protect healthcare IoT devices in a Zero Trust world

  • Over 100 million healthcare IoT devices are installed worldwide today, growing to 161m by 2020, attaining a Compound Annual Growth Rate (CAGR) of 17.2% in just three years according to Statista.
  • Healthcare executives say privacy concerns (59%), legacy system integration (55%) and security concerns (54%) are the top three barriers holding back Internet of Things (IoT) adoption in healthcare organizations today according to the 

By Louis Columbus, 08 November 2018, 0 comments. Categories: Applications, Data & Analytics, Security, Software, Vulnerabilities.

Gartner’s latest Magic Quadrant shows the need for cloud access security brokers going forward

The role of the cloud access security broker (CASB) will become ever-more important in the context of organisational security.

According to analyst firm Gartner, through 2023 “at least 99%” of cloud security issues will be the fault of the customer. The notion of shared responsibility – one which regular readers of this publication may well be sick of hearing given its frequency – needs to be hammered...

By James Bourne, 05 November 2018, 0 comments. Categories: Infrastructure, Research, Security, Vulnerabilities.

As more companies put sensitive data in the public cloud – so the security threats increase

More organisations are putting their sensitive data in the public cloud – so it comes as no surprise that cloud threats, and mistakes in SaaS, IaaS and PaaS implementation are at an all-time high.

That is the key finding from a new report by McAfee, which argues the old bugaboo of shared responsibility continues to kick in and give organisations a kick in the teeth when it comes to cloud security.

By James Bourne, 30 October 2018, 0 comments. Categories: Data & Analytics, Data Loss, Infrastructure, Research, Security, Vulnerabilities.