You searched for aws/ | SC Media

Your search for aws/ returned 27 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Opinion remove

Your search for aws/ returned 27 results

Sort Results:

Relevant Recent
Executive Insight, Opinions

Data Protection, Security and Shared Responsibility: What You Need to Know about Amazon Web Services

By Joe Merces So you’ve moved your infrastructure to the Amazon Web Services cloud. What a relief, right? No more worries about the security of your critical applications and data. And disaster recovery should be a (relative) breeze. Unfortunately, that’s not the case. The world was different only 10 years ago. Back then, disaster recovery…
Executive Insight

Data Protection, Security and Shared Responsibility: What You Need to Know about AWS

So you’ve moved your infrastructure to the Amazon Web Services cloud. What a relief, right? No more worries about the security of your critical applications and data. And disaster recovery should be a (relative) breeze. Unfortunately, that’s not the case. The world was different only 10 years ago. Back then, disaster recovery usually meant recovering…
Executive Insight, Opinion, Security News

What’s in your cloud?

The lack of visibility into the expanded cloud attack surface is a fast-growing problem that is only getting worse. Although we have seen misconfigurations in the cloud before, the Capital One breach is a sobering reality check for the security industry. We need to vastly improve threat detection and response in cloud environments. The attack…
Executive Insight, Opinion, Security News

Adapting the classical art of penetration testing to the cubist world of cloud

Many technical practitioners may believe that, at the end of the day, penetration testing is penetration testing. Proper penetration testing, however, is an art that must adapt over time. As an artist’s tools, materials, and media evolve, art evolves. With this evolution in “technology, techniques and approaches must change as well. Our “IT medium” has…
Executive Insight, Opinion

The four levels of automated remediation

Automated remediation of cloud misconfigurations was a big theme in 2018, and here at DivvyCloud we expect the trend to continue through 2019. One of the significant challenges customers face is putting automation into action, instead of just talking about it. When enterprises evaluate Cloud Security Posture Management (CSPM) solutions, automated remediation is frequently the…
Executive Insight, Opinion

Containing the ripple effect of cloud cyberattacks

The internet continues to grow more interwoven, interdependent and fragile, with power increasingly concentrated in a handful of big cloud players. When a cyberattack brings down one of them, there is often extensive collateral damage to the thousands of enterprises relying on its service. Case in point: in late October Amazon’s Route 53 DNS server…
Executive Insight, Opinions

Data Breaches Caused by Misconfigured Servers

Misconfigured server infrastructure is often considered one of the most significant causes of data breaches within the IT industry. This human error phenomenon is usually unintentional, but it can have catastrophic consequences regarding the exposure of sensitive personal information as well as potentially damaging the reputation of your business. Data breaches have gathered a lot…
Executive Insight

Leaking cloud buckets – How to protect your information in the cloud

Imagine you’re an IT executive responsible for the safekeeping of tens of millions of customer data records. You’re storing this data in the cloud because it’s unsustainable to maintain it in your own data center. But, just now, you received an email from hackers stating they have gained control of your cloud data and are…
Executive Insight, Opinion

The cloud security capers

Today I am going to share three, semi-fictional cloud adoption horror stories that will make you rethink your current cloud strategies. The False Choice A biometrics security and identity solutions provider sought to establish itself as the premium global brand in the physical security industry. To achieve this goal, company leaders knew they had to…
Executive Insight, Opinion, Security News

The zero trust model explained

Zero Trust is more than a buzzword or a single product. Instead, it is a recognition that how we work has fundamentally changed and that we need to shift the way that we think about working securely. At its core, Zero Trust marks a move away from the binary security model that focuses on keeping…
Next post in Executive Insight