cloud

Glass Class: Protecting Unmanaged Device Access to Cloud Apps

This post was originally published by Will Houcheime. With the rapid adoption of bring your own device (BYOD), companies are in need of a security solution that can secure any device outside of the corporate firewall. Some companies have turned to agent-based tools in order to secure unmanaged device access; however, they consistently find that […]

What the 2019 AWS Security Report Tells Us About Preventing a Cloud Data Breach

This post was originally published by siri oaklander. In the wake of the recent Capital One security breach in their cloud environment on AWS, the security community is taking another look at how we approach cloud security. CloudPassage recently shared guidance in our blog, “Capital One Data Breach: Non-Technical Tips To Not Be A Headline”. Here […]

Preventing a Capital One Cloud Data Breach

This post was originally published by amol sarwate. On July 29, it was announced that there was a Capital One cloud data breach. A hacker had accessed about 100 million credit card applications, and investigators say thousands of Social Security and bank account numbers were also taken. This comes on the eve of the news […]

What the 2019 AWS Security Report Tells Us About Preventing a Cloud Data Breach

This post was originally published by siri oaklander. In the wake of the recent Capital One security breach in their cloud environment on AWS, the security community is taking another look at how we approach cloud security. CloudPassage recently shared guidance in our blog, “Capital One Data Breach: Non-Technical Tips To Not Be A Headline”. Here […]

Cloud-based shared files are vulnerable to ransomware attacks

Vectra, a California based Cyber Threat Detection and Response firm discovered in its study that cloud-based shared files are extremely vulnerable to ransomware attacks. As most Infrastructure-as-a-service (IaaS) offering cloud providers allow malicious encryption of shared files on network servers. Infiltrators can easily evade the security perimeters and target files with encryption algorithms which remain […]

Encrypt your Cloud Data!

This post was originally published here by Anurag Kahol . After the Capital One hack, our phones are abuzz with customers seeking security.  The answer is simple, encrypt your data!   The Capital One breach  is the first major breach that exploited an application flaw to expropriate a large amount of sensitive data.  Prior cloud breaches were the […]

Guardians of the Cloud: The Latest Security Findings

This post was originally published here by  Juan Lugo . With the emergence of cloud adoption and BYOD in the workplace, companies are experiencing an overwhelming amount of data breaches. This is largely because they are not taking the appropriate steps to secure data in the cloud. As such, Bitglass conducted a survey with IT professionals […]

Glass Class: Securing Patient Data in the Cloud

This post was originally published here by Will Houcheime. Organizations that operate within the healthcare industry have an immense responsibility to secure protected health information (PHI), personally identifiable information (PII), and other highly sensitive data. Additionally, the need for mobility in healthcare is critical because employees like doctors often have multiple affiliations, meaning that they […]

Making Security and Compliance a Priority in the Cloud

This post was originally published here by gregg rodriguez. Global data breaches hit 1,500 in 2018, based on public disclosures, making security and compliance in the cloud a top priority for enterprises. While cloud computing can quickly expand your capabilities and help you achieve your business goals, it also introduces complexity to securing these new computing environments.  Despite the complexity, […]

Cloud requires new approach to security and compliance

This post was originally published here by  gregg rodriguez. Public cloud, or Infrastructure as a Service (IaaS), offers an enhanced level of flexibility and scalability with its on-demand unlimited virtual space and abundant server resources. Though as more enterprises rush to reap the benefits of the cloud, they’re facing new challenges in maintaining cloud security […]

Share this page