Cloud

What is Serverless Computing Security?

Serverless computing is among the newest trends in cloud computing and...

How Netflix Secures AWS Cloud Credentials

LAS VEGAS - Netflix has long been the poster child for being...

An Inside Look at OpenStack Security Efforts

The open source OpenStack cloud platform is used by major corporations such as Walmart, the world's largest carriers, such as AT&T, and...

122 Million U.S. Households’ Personal Information Exposed Online

UpGuard researchers yesterday disclosed yet another massive data leak due to a misconfigured...

How Google Encrypts Data in the Cloud

Google operates one of the largest cloud networks on the planet and uses multiple techniques to keep the data that moves across...

Tens of Thousands of Full Credit Histories Exposed in Amazon S3 Bucket

Despite Amazon's recent launch of its GuardDuty threat detection service, the trend of major cloud breaches continues: UpGuard researchers recently came across...

Cloud Security Fail: Classified U.S. Military Data Exposed in Amazon S3 Bucket

UpGuard security researchers uncovered several unprotected databases in the cloud over the past several...

McAfee to Acquire CASB Vendor Skyhigh Networks

McAfee on Nov. 27 announced that it is acquiring Skyhigh Networks, a...

GhostWriter AWS Issue Impacts Thousands of Amazon S3 Buckets

  Skyhigh Networks researchers is warning of an issue they're calling "GhostWriter," in which Amazon S3 buckets are misconfigured to allow public write access, enabling...

Docker Swarm vs Kubernetes: What’s the Most Secure Container Orchestrator?

Containers are being increasingly used and deployed by organizations of all sizes, with...

Latest articles

The IoT Cybersecurity Act of 2020: Implications for Devices

A universe of devices and technology has fallen into our laps at a speed that organizations struggle to manage effectively. And that boom in...

Top 10 Governance, Risk and Compliance (GRC) Vendors

Governance, risk, and compliance (GRC) software helps businesses manage all of the necessary documentation and processes for ensuring maximum productivity and preparedness. Data privacy...

Best Intrusion Detection and Prevention Systems: Guide to IDPS

Intrusion Detection and Prevention Systems (IDPS) operate by monitoring network traffic, analyzing it and providing remediation tactics when malicious behavior is detected. They look...

Automating Security Risk Assessments for Better Protection

Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest...