Research Eyes Misconfiguration Issues At Google, Amazon and Microsoft Cloud

Qualys report looks at how misconfiguration issues on cloud service providers help attackers gain access. Image: ArtemisDiana/Adobe Stock Cloud misconfiguration — incorrect control settings applied to both hardware and software…

Continue ReadingResearch Eyes Misconfiguration Issues At Google, Amazon and Microsoft Cloud

Google Cloud Study: Big Risk in Proliferating Credentials, Keys

Image: Bilalulker/Adobe Stock Credentials are the achilles heel in enterprise security, according to a new report from Google Cloud’s Cybersecurity Action Team, which found that credential vulnerabilities accounted for 60%…

Continue ReadingGoogle Cloud Study: Big Risk in Proliferating Credentials, Keys

Scarleteel Threat Targets AWS Fargate, Launches DDoS and Cryptojacking Campaigns

The Scarleteel threat targets AWS Fargate environments for data theft and more malicious types of attacks such as cryptojacking and DDoS. Learn how to mitigate this threat.

Source of Article

Continue ReadingScarleteel Threat Targets AWS Fargate, Launches DDoS and Cryptojacking Campaigns

White House Launches Cybersecurity Implementation Plan

Image: Maksym Yemelyanov/Adobe Stock U.S. President Biden’s administration this week released the first iteration of the National Cybersecurity Strategy Implementation Plan, which was announced in March 2023. The plan aims…

Continue ReadingWhite House Launches Cybersecurity Implementation Plan

Okta vs. Duo (2023): Which IAM tool is best for your business?

Identity and access management solutions like Okta and Duo are extremely valuable for maintaining organizational data security. While both Okta and Duo offer strong identity management features like multifactor authentication,…

Continue ReadingOkta vs. Duo (2023): Which IAM tool is best for your business?