-
Expressing amazement that SQL injection is STILL a top data security threat, expert Karen Lopez predicted that the longstanding problem will be overtaken by users planting data on open storage buckets like AWS S3 and Azure Data Blob.
-
The point of AVNM is to give you a centralized way to manage connectivity and security policy, scoped to subscriptions or management groups for your entire Azure estate.
-
A new cloud security study shows that despite the recent surge in ransomware attacks, few organizations are encrypting their sensitive data, which is one of the most recommended best practices to mitigate such attacks.
-
Microsoft blamed Russia for new attacks against U.S. supply chain infrastructure, saying the Russia-backed nation-state actor Nobelium has changed its tactics this time.
-
With cloud data security all over the news these days, experts Joey D'Antoni and Allan Liska recently answered user questions about the latest trends in ransomware and other current threats, best practices for cloud data protection and more.
-
Cloud security specialist Ermetic published research that found compromised identities can lead to risky AWS S3 storage buckets in certain situations, resulting in ransomware vulnerabilities.
-
"We are a pioneer of Zero Trust computing and have deep experience running this model at scale."
-
20x Microsoft MVP Brien Posey explains how best practices can help save your job -- and how he was once fired for being an internal IT sabotage threat.
-
The problem hinders secure production deployments and will require effort and maturity to solve, according to a new post from the Cloud Native Computing Foundation (CNCF).
-
One of the big advantages to using AWS as a management platform for your IoT devices is that you can create security profiles that are able to generate alerts in response to conditions that might indicate a security issue.
-
VMworld 2021 kicked off with a blitz of security-related announcements including developments in the company's "journey to Zero Trust," secure access service edge (SASE) improvements, new capabilities to fight ransomware and more.
-
"I'm not gonna lie, it's not really pretty. I could say it was really awful, because cyber insurance vendors are so hammered with claims that it's taking a long time for them to react."
-
Enterprise SD-WAN deployments will see big jumps in the use of SASE and AI over the next few years, predicts research firm Gartner.
-
"A ransomware attack for your organization is not the same as traditional DR; it's not like you just press the big button and get yourself out of it."
-
"If you can get away with it, use microservices as your preferred architecture," advised DevOps application security expert Carlos Rivas in an online presentation last week.
-
Finding no one-stop-shop for a list of initial access vulnerabilities used by ransomware attackers, cybersecurity expert and Virtualization & Cloud Review tech event presenter Allan Liska started one on his own and crowdsourced the effort on Twitter.
-
Research firm Dell'Oro Group said Cisco retained its market share lead in the SD-WAN space, but there was some movement among the rest of the top five vendors in its latest quarterly report.
-
Two key ways to protect cloud data from ransomware and other attacks are to use Multi-Factor Authentication (MFA) and "don't trust anyone or anything," says cloud data protection expert Joey D'Antoni.
-
"Given that the cloud holds a seemingly endless amount of computing power, hackers have a clear motive in stealing computing resources to run their cryptocurrency mining activities."
-
Microsoft is increasingly banking on the Zero Trust security model to combat an exploding ransomware threat.
-
"Regrettably, we should expect a public cloud to be commandeered to launch a systemic ransomware attack this fall."
-
Challenges cited by global SD-WAN operators include workforce health protection, tracking the shift back from remote to office environments, service disconnects due to business closures, and supply chain disruptions.
-
Smaller organizations need the same IT security services as larger businesses but without the corresponding price tag, says Paul Schnackenburg, so he decided to "build a SIEM for SMBs" on a shoestring budget.
-
Paul Schnackenburg takes a look at how Microsoft 365 Defender integrates several different security technologies into a single console.
-
"In Q1, they demanded astronomical ransoms and refined their arsenal, including adding new ways to hide from security tools."