James Todd, KPMG: On automation and machine learning as the future of security 

James Todd, SecOps director at KPMG, describes his role as a merging of SecOps, security architecture, and cloud security. It is a particularly interesting crossing point with regard to automation. 

“It’s at that intersection of the cloud environment, being very much aligned to deploying everything as code,” says Todd. “A lot of automation is a big part of that. Being able to take dynamic action within a cloud environment is much easier and well-versed than within a...

Organisations increasing modern data protection for cloud to reduce security risks

Veeam Software, a specialist in modern data protection, has released the findings of the company’s Cloud Protection Trends Report 2023, covering four key 'as a Service' scenarios: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), and Backup and Disaster Recovery as a Service (BaaS/DRaaS).

The survey found that companies are recognizing the increasing need to protect their SaaS environments. For example, nearly 90% of Microsoft® 365...

Next generation of phishing attacks uses unexpected delivery methods to steal data

A man fishing at a lake.

Netskope, a specialist in secure access service edge (SASE), has unveiled new research that shows how the prevalence of cloud applications is changing the way threat actors are using phishing attack delivery methods to steal data. 

The Netskope Cloud and Threat Report: Phishing details trends in phishing delivery methods such as fake login pages and fake third-party cloud applications designed to mimic legitimate apps, the targets of phishing attacks, where the fraudulent content...

86% of cloud attacks in healthcare sector lead to financial losses or other damage

A surgical team in an operating theatre.

61% of companies in the healthcare industry suffered a cyberattack on their cloud infrastructure within the last 12 months, compared to 53% for other verticals.

This is according to the 2022 Cloud Security Report by cybersecurity vendor Netwrix. Phishing was the most common type of attack reported, followed by ransomware or other malware attacks, and targeted attacks on cloud infrastructure.

Dirk Schrader, VP of security research at Netwrix, said: “The healthcare...

81% of companies had a cloud security incident in the last year

A security camera.

As many as 81% of organisations have experienced a cloud-related security incident over the last 12 months, with almost half (45%) suffering at least four incidents.

This is according to a study by Venafi, a provider of machine identity management, which has evaluated the complexity of cloud environments and its impact on cybersecurity.

The underlying issue for these security incidents is the dramatic increase in security and operational complexity connected with cloud...

Benten Technologies: A secure, passwordless future

A padlock and bank cards on a keyboard.

A Benten Technologies spokesperson explains how the company's patented technology is solving critical user identity verification problems.

For anyone who doesn't know about Benten Technologies, what type of product and service do you offer?

We offer a patented smartphone-based authentication and authorisation service. Integration with our system is through well-defined APIs. 

Using our service, through the click of a button, our clients can have passwordless...

AWS and Zscaler expand relationship to help companies move to the cloud securely

Zscaler has extended its relationship with Amazon Web Services (AWS), a preferred cloud provider.

In addition, Zscaler announced innovations built on Zscaler’s Zero Trust architecture and AWS to help enterprises securely accelerate their transition to the cloud. Working together, the companies will deliver customers a unified solution to consolidate and simplify cloud security operations while helping organisations advance their security architecture from ineffective legacy...

Cloud data breaches and cloud complexity on the rise

A graphic of a padlock representing cybersecurity.

45% of businesses have experienced a cloud-based data breach or failed audit in the past 12 months, up 5% from the previous year, raising even greater concerns regarding to protecting sensitive data from cybercriminals.

This is according to the 2022 Thales Cloud Security Report, conducted by 451 Research, part of S&P Global Market Intelligence.

Globally, cloud adoption and notably multicloud adoption, remains on the rise. In 2021, organisations worldwide were using...

Jetstack unveils industry-first software supply chain security toolkit

Links of a rusty chain.

Jetstack, a Venafi company and specialist in cloud native, open source and strategic consulting services, has announced the availability of an easy-to-use, interactive and comprehensive toolkit for securing modern software supply chains.

The visual, web-based resource is available to everyone and is designed to help organisations evaluate and plan the crucial steps they need to tackle effective software supply chain security. Software supply chain security has become an...

Aqua Security creates first unified scanner for cloud native security

A padlock on a shed.

Aqua Security, a pure-play cloud native security provider, has unveiled multiple updates to Aqua Trivy, which it says makes it the world’s first unified scanner for cloud native security.

Consolidating multiple scanning tools into a single tool, it is now the most comprehensive vulnerability and misconfigurations scanner for cloud native applications and infrastructure. Trivy is also being integrated into the Aqua Platform as Trivy Premium, through which customers can take...