Security

Bitglass Security Spotlight: Google, SynAck, & Drupal

This post was originally published here by Jacob Serpa. Here are the top cybersecurity stories of recent weeks:  Google improves G Suite’s collaboration capabilities SynAck ransomware evades antivirus software Drupal websites subject to cryptojacking Nigelthorn malware targets facebook users to mine cryptocurrency 211 LA County exposes 3.2 million files through AWS misconfiguration Google improves G […]

Apple makes iOS 12 Mobile Security Impeccable

Apple is said to position its next version of the operating system at a peak when it comes to mobile security. Apple iOS 12 which is said to make its debut this fall is touted as the most secure and safe operating system platform released by the Cupertino giant till date. Firstly, the iOS 12 […]

Come see us at Gartner Security and Risk Management Summit!

This post was originally published here by casey pechan. We love that Gartner Security and Risk Management Summit. Year after year the summit continues to provide thought-provoking talks, enlightening conversations, and and important networking activities. This year we’re a sponsor, and we hope to see you there! Read on to see the important dates and […]

Bitglass Security Spotlight: Twitter, PyRoMine, & Stresspaint

This post was originally published here by  Jacob Serpa. Here are the top cybersecurity stories of recent weeks: Twitter exposes user credentials in plaintext PyRoMine mines Monero and disables security Stresspaint malware hunts Facebook credentials MassMiner malware mines cryptocurrency Access Group Education Lending breached Twitter exposes user credentials in plaintext Despite the fact that Twitter […]

The most important questions to ask when choosing a cloud / agile security solution

This post was originally published here by marc luo. Cloud and agile computing has introduced a new set of challenges into the enterprise security space. Virtual servers are now built in an automated fashion, based on a set of unique identification parameters that vary depending on the organization. And in order to to provide improved […]

Automating server workload security with CloudPassage Halo

This post was originally published here by casey pechan. The Enterprise Strategy Group consistently produces some of the most thorough research the security industry. Their latest solution showcase, Automating server workload security with CloudPassage Halo, is an excellent sample of their in-depth work. The report begins by delving into the the various infrastructure, platform, and software models, (including containers), […]

Webinar: integrating security into your CI pipeline

This post was originally published here by casey pechan. Our latest webinar Integrating security into our CI pipeline, examines how containers and image vulnerability assessment can be integrated into your DevSecOps tools and processes. After all, one of the biggest challenges of adopting containerization is fast and effective vulnerability management. And the only way to […]

Automated, unified visibility and evaluation for security – yes it’s possible

This post was originally published here by casey pechan. When it comes to enterprise security, the needs are growing faster than universities can produce graduates with the relevant diplomas. It can be challenging to break down an organization’s list of security controls  into something manageable, let alone doable. Accomplishing it with a single security platform […]

Bitglass Security Spotlight: LinkedIn, Vector, and AWS

This post was originally published here by Jacob Serpa . Here are the top cybersecurity stories of recent weeks: LinkedIn security gap exposes users’ data Vector app reveals customers’ information AWS misconfiguration makes LocalBlox user information public New malware steals data via powerlines Banking apps deemed the most unsecured  LinkedIn security gap exposes users’ data LinkedIn’s […]

Share this page