Cloud services firm Expedient announced its release of the new Expedient Security CTRL Suite, a platform the company says was designed to provide unified security management and visibility capabilities to organizations that employ on-premises and multi-cloud environments, according to CRN.
Rob McCafferty, Expedient’s vice president of pre-sales and engineering, said the solution was created in response to a perceived need to provide ongoing workload management capabilities to clients that are undergoing workload transition to Expedient.
“[E]ven after we tell them where to go and which cloud to choose, we still have to make sure that we‘re providing a security infrastructure across all of those environments to make sure that the cloud is just as safe, if not safer, than with their current workloads if they’re running on-prem or anywhere else,” McCafferty said.
Expedient Security CTRL’s features include a multi-cloud firewall and cross-cloud networking that employs VMware‘s NSXT technology, according to McCafferty. The company has also bolstered the product’s multi-cloud environment security capabilities with identity management and a managed SIEM that enables correlation of data from multiple sources.
Jill Aitoro leads editorial for SC Media, and content strategy for parent company CyberRisk Alliance. She 20 years of experience editing and reporting on technology, business and policy.
Washington, D.C.'s Department of Insurance, Securities and Banking has disclosed that 800GB of data claimed to have been stolen by the LockBit ransomware operation was obtained from an attack against third-party software provider Tyler Technologies following the ransomware gang's threats to expose 1GB of the exfiltrated data to coerce the agency into providing the demanded ransom, reports The Record, a news site by cybersecurity firm Recorded Future.
Organizations could have their sensitive information compromised through a high-severity vulnerability in Google Cloud, Azure, and Amazon Web Services command line interface tools dubbed "LeakyCLI", The Hacker News reports.