You searched for aws/ | SC Media

Your search for aws/ returned 273 results

Your search for aws/ returned 273 results

Sort Results:

Relevant Recent
Executive Insight, Opinions

Data Protection, Security and Shared Responsibility: What You Need to Know about Amazon Web Services

By Joe Merces So you’ve moved your infrastructure to the Amazon Web Services cloud. What a relief, right? No more worries about the security of your critical applications and data. And disaster recovery should be a (relative) breeze. Unfortunately, that’s not the case. The world was different only 10 years ago. Back then, disaster recovery…
Executive Insight

Data Protection, Security and Shared Responsibility: What You Need to Know about AWS

So you’ve moved your infrastructure to the Amazon Web Services cloud. What a relief, right? No more worries about the security of your critical applications and data. And disaster recovery should be a (relative) breeze. Unfortunately, that’s not the case. The world was different only 10 years ago. Back then, disaster recovery usually meant recovering…
Sponsor Content

Meet your shared security responsibility on AWS with CIS

In late 2019, Gartner forecasted that cloud revenue will grow 17% from 2019 to 2020. Cloud consumption drastically changed in early 2020 when the workforce rapidly went remote. According to Flexera, 59% of enterprises expect cloud usage to exceed prior plans due to COVID-19. With the increase in cloud computing, cloud security is more important than…
Executive Insight, Opinion, Security News

What’s in your cloud?

The lack of visibility into the expanded cloud attack surface is a fast-growing problem that is only getting worse. Although we have seen misconfigurations in the cloud before, the Capital One breach is a sobering reality check for the security industry. We need to vastly improve threat detection and response in cloud environments. The attack…
Tesla (1)
Cybercrime

Tesla’s AWS servers hijacked by cryptominers

The hijacking of Tesla’s Amazon Web Server cloud system by rogue cryptominers is proof that no one is immune to a misconfigured AWS server nor cryptomining attacks. RedLock researchers discovered an unprotected Kubernetes console, belonging to Tesla, that exposed access credentials to Tesla’s Amazon Web Services environment. “Essentially, hackers were running crypto mining scripts on…
Next post in Cybercrime