Security experts have repeatedly recommended system hardening to reduce vulnerabilities in the cloud. But what does that entail? This article explains while offering additional guidance to better monitor the integrity of cloud configurations.
One day after Twilio announced a breach after an attacker successfully stole employee credentials in a phishing scam, Cloudflare posted on its blog Tuesday that it believes its employees were targeted in a similar attack.
Cloud-based communications platform Twilio said a limited number of customer accounts were accessed after a sophisticated phishing attack successfully nabbed employee credentials.
Qualys' new version of its VMDR vulnerability-management platform adds cyber-risk assessment and management tools. The company's Mahul Revankar takes time at RSAC 2022 to explain how it all works to Bill Brenner.
Only 16% of respondents ranked on the Ermetic Cloud Security Model at the top two levels, and 80% of companies said they lack a dedicated security team responsible for protecting cloud resources from threats.
A security researcher late last week disclosed that they found two vulnerabilities in the Google Cloud Platform, one on DevSite, the other on Google Play — bad code that could have led to hijacked accounts via cross-site scripting (XSS) attacks.