The Unit 42 Threat Intelligence team discovered Azurescape - the first known cross-account container takeover in the public cloud affecting Azure Container Instances.
The Cybersecurity and Infrastructure Security Agency (CISA) released the Cloud Security Technical Reference Architecture (TRA) and Zero Trust Maturity Model for public comment.
A critical security vulnerability in Microsoft’s Azure cloud database platform – Cosmos DB – could have allowed complete remote takeover of accounts, with admin rights to read, write and delete any information to a database instance.
A new DoControl report, Quantifying the Immense Risk of Unmanaged SaaS Data Access, highlights how the vast amounts of unmanaged data in today’s enterprises have led to a growing number of insider and external threats to global organizations.
New research Linux Threat Report 2021 1H from Trend Micro found Linux operating systems are being targeted – with nearly 13 million detections from the first half of 2021 – as organizations increase their digital footprint in the cloud and the pervasive threats that make up the Linux threat landscape.
Doug Dooley, Chief Operating Officer at Data Theorem, discusses full-stack application attacks and why organizations are vulnerable to these types of security breaches.
The latest Forrester Research report, Best Practices: Cloud Governance, gives cloud leaders a blueprint and best practices for cloud governance and accounts for stakeholders, workload targets, processes and tools.
WizCase’s security team, led by Ata Hakçıl, found a significant breach affecting Reindeer, an American marketing company previously associated with Patrón Tequila, Tiffany & Co. and other brands. This breach exposed customers’ names, date of birth, email addresses, physical addresses, phone numbers and more.
In today’s business environment security is a fundamentally functional and non-functional requirement and cannot be an afterthought where issues are chased after systems are operational. That’s why it’s vital that best practices be implemented by companies from the onset of any cloud migration strategy: backed by a robust and real-time capability to plan, investigate, and respond to all security incidents.