Cloud Security | SC Media

Cloud Security

Partner

Gaining Control Over Cloud IAM Chaos
When it comes to cloud IAM, security and operations teams are flying almost blind. This visibility drops to zero as cloud deployments grow and cloud IAM complexity increases with scale. This resulting tangled puzzle of IAM policies and rules means organizations lose any ability to assign and manage cloud least privileged access (LPA), let alone understand the permissiveness of their cloud access. Even more important, when organizations are not entirely in control of cloud IAM governance, they are incredibly vulnerable. If they experience a security incident, the lack of cloud IAM visibility makes determining the potential blast radius a tough, if not impossible, task.
2020 State of Enterprise Cloud Adoption and Security
We surveyed nearly 2,000 IT professionals throughout the 2019 calendar year to better understand how enterprises are adopting public cloud, multi-cloud, containers, and other services, as well as the challenges they experience in maintaining security and compliance. The DivvyCloud 2020 State of Enterprise Cloud Adoption and Security Report synthesizes the survey results and offers a unique look at the current state of cloud adoption and security while highlighting valuable insights to leaders and practitioners in all stages of cloud adoption.
IaC Security White Paper
Security has changed as enterprises continue to adopt and embrace cloud and it’s no longer acceptable for security teams to be purely reactive. DivvyCloud understands this challenge and believes that incorporating preventive security can substantively strengthen an organization’s security posture.
2020 Cloud Misconfigurations Report
Cloud misconfiguration-induced data breaches cost companies nearly $5 trillion in just two years. DivvyCloud conducted in-depth research on data breaches attributed to cloud misconfigurations, identified factors contributing to the likelihood of such data breaches, and quantified the overall impact on the affected companies.
Keeping Your Cloud Out of the News
In comparison to the traditional datacenter, more people are able to access, change, and deploy critical resources and services in the cloud. While this can be powerful, it also increases the likelihood of something going awry. We’ve seen cloud security issues in the headlines with alarming regularity.
Cisco Umbrella At a Glance
Enterprise security and networking are facing a significant transformation as organization embrace SASE, a Secure Access Service Edge. Wide-scale adoption of cloud applications, an increase in remote workers, and expansion of branch offices has rendered the centralized, on-premises security model impractical. The convenience, cost savings, and performance benefits of going direct to the internet is driving a new decentralized approach to networking. Yet with change comes risk and a new set of security challenges. Organizations require a broader set of protection that not only improves security, but simplifies management.
C-SUITE PERSPECTIVES: Accelerated Cloud Migration but Lagging Security
The combination of a remote workforce and on-demand consumption of goods and services forced organizations to adopt an infrastructure that supports the digital experience. Simply put, the urgency of such an unanticipated and unprecedented situation removed many obstacles that had previously stood in the way of digital transformation plans — but not without complications.
Attacks in the Wild on Container Infrastructure A Cloud Native Threat Report
Aqua's security research team, Nautilus, analyzed 16,371 attacks on container and cloud native infrastructure which occurred over a period of 1 year, between June 2019 and July 2020. This research aims to present the entire kill-chain of attacks against cloud native environments. Based on the attacks against our honeypots, this research publication provides a cohesive analysis. By examining the trends and behaviors identified in the past attacks, we are able to predict how this threat landscape will continue to morph, arming you with knowledge and tools to protect your environment.
Three Big Public Cloud Security Concerns
As a user of public cloud services, you can deploy your workloads faster than ever. But, with that speed comes some drawbacks, as you still have to keep up with the management and administration these environments, including properly configuring and securing your public cloud infrastructure. Issues such as servers unintentionally left open to the public, unencrypted datastores, as well as missing or weak authentication leave organizations exposed to significant security risks.
Cloud-Native Cyber Defense
Workers who can no longer collaborate in person are increasingly being directed to use cloud-based collaboration platforms and mobile-chat channels so they can work remotely with co-workers. These new work styles have opened up fresh cybersecurity vulnerabilities. The attack surface is now stretched to employees. Ever opportunistic, criminals are increasingly targeting remote workers’ personal devices and even the workers themselves, resulting in record numbers of attacks.
Five Steps: How to Defend Your Company Against a Security Breach
The enterprise move to the cloud shows no signs of slowing. By 2020, 83 percent of enterprise workloads are expected to be hosted in the cloud. It’s easy to see why. Using the cloud lessens the burden on IT departments, freeing them to develop new products and services (often in the cloud). It gives today’s workers the 24/7 access they demand. Cloud services create new efficiencies, drive innovation, and lower costs.
Stopping Breaches for Govies
In 2018, it was reported that public sector organizations are among the top three most exploited sectors in the United States. Government agencies, schools, health systems, need effective solutions that can protect against a variety of cyber threats. Many companies use buzzwords like next-gen AV, machine learning, or cloud-delivered. Learn more about how to identify the true meanings behind these words figure out what could best be utilized by your agency.
A Proven Approach to Cloud Workload Security
As a cybersecurity company that has built one of the biggest cloud architectures in the world, CrowdStrike has gained an exceptional vantage point and garnered unique experience on what it takes to secure cloud workloads.
The Orca Security 2020 State of Public Cloud Security Report
The world of cybersecurity isn’t fair. Security teams need to secure everything, but attackers need only find one weak link. For most organizations, cloud workload security is dependent upon the installation and maintenance of security agents across all assets. This rarely happens, as this report shows.
Threat Intelligence Spotlight: Hunting Evasive Malware
The Threat Intelligence Spotlight: Hunting Evasive Malware report draws on data gathered from the 650-plus organizations that eSentire protects and VMware Carbon Black’s extensive endpoint protection install base.
Cloud-Native Security Platforms: The Solution for the Digital Age
Security teams trying to adapt to ongoing changes, increased risk and more data are finding it challenging to protect the evolving security ecosystem. Organizations are modernizing operations and adaptive technology is at the forefront. Technology is fueling superior customer experience with improved scalability, reliability and performance. Cloud-native platforms have proved to be the only viable runtime for continuously increasing volumes of data ingestion with real-time machine learning applied. Cybersecurity requires cloud-native scale, agility and speed to win in the modern digital business world.
The Cloud: How CISOs Can Embrace It (Wisely), Not Fear It
Cloud computing is one of the great transformational shifts in corporate information technology. It allows businesses to manage their IT needs in innumerable new ways—some of them great, some of them terrible. To embrace the cloud fully and wisely, a CISO must master two roles read on to find out how.
Driving Immediate Value with a Cloud SIEM
Yesterday’s SIEMs were not built for today’s hybrid, remote, and cloud environments. Setting up a traditional SIEM in your current tech stack can feel like navigating an endless maze of hardware, data sources, workarounds, and different interfaces.
Top Threats to Cloud Computing: The Egregious 11
You’ve known for a long time that enhancing your security is critical as you move more workloads from the on-premises datacenter to the cloud. Many organizations are being proactive by reexamining their cloud security posture. Given the events of the last couple months, it’s a good time to resurface the Cloud Security Alliance’s (CSA) “Egregious 11” list of top vulnerabilities and threats.
Security’s new frontier: The Cloud
Read this ebook to learn how Cisco Cloud Security helps you securely adopt and use the cloud, and better manage security for the way the world works today.
SANS Report: Cloud Security Survey 2019
Read the report from SANS Instructor Dave Shackleford to learn how your peers across tech, finance, cybersecurity, and other industries address cloud security vulnerabilities and more.
Mastering policy setting and control in the cloud
Extending the necessary control and policies in the cloud can be a daunting task for many enterprise customers. But with the right tools in place, it doesn’t have to be that way. Hear from guest presenter Forrester Vice President, Principal Analyst serving Security and Risk professionals, Andras Cser as he shares their recommendations for securing data and mastering policy setting.
A guide to achieving SaaS security and compliance
Today’s employees demand greater flexibility, productivity, and mobility. And while cloud and BYOD policies have answered that call, they’ve also added unforeseen complexities the way IT manages data security and compliance. How can you balance productivity and risk in SaaS environments?
Top gaps in sandbox appliances
With the barrage of headline-topping breaches, it’s well known that sandboxing is a critical defense against zero-day attacks.
AutoNation securely drives to the cloud
With hundreds of retail and corporate locations, AutoNation was looking for a security solution that would apply robust malware protection for users connecting directly to their cloud applications and the open internet.
Securing the public cloud: Seven best practices
Read this guide to learn your responsibilities when it comes to the public cloud, results of SophosLabs threat research into cloud-based attacks, and seven best practices in securing AWS, Azure and GCP.
Cloud-based authentication buyer’s guide
This buyer's guide will help you determine whether a cloud-based multi-factor authentication solution is right for your organization and details the top features to look for in an authentication solution to securely enable your digital transformation.
Endless possibilities
The cloud brings endless opportunity to innovate. It changed the way we do customer relationship management, analyze and share data, and deploy new services. The cloud will also change how you protect your organization. It is here, in the cloud, where you have the best chance to prevent, detect, and respond to today’s sophisticated threats before they become a breach. This ebook looks at how CISOs can leverage the power of the cloud – including advanced analytics, threat intelligence, massive scalability, and more – to achieve better protection, better performance, and better value
SC Media
Assessment of Gartner’s market guide for cloud workload protection platforms
As the requirements for cloud services and container use cases increase, so too does the attack surface that InfoSec and DevOps teams must address as a unified security posture to keep the business safe from harm. Download this paper to find out more about the core capabilities and architectural considerations for cloud workload protection platforms.
Using Trend Micro’s hybrid cloud security solution to meet PCI DSS 3.2 compliance
Trend Micro Deep Security delivers a broad range of security controls optimized for modern data centers, cloud environments, as well as container deployments. This offering complements the security provided by platform and service providers, including cloud service providers (CSP) such as Amazon Web Services (AWS) and Microsoft Azure, and can help an organization achieve compliance with specific PCI DSS 3.2 requirements.
Servers, servers, everywhere: How the hybrid cloud changes the game for security
While organizations struggle to adopt the latest technologies to power business success, servers remain the workhorse of the enterprise even with major shifts from physical, to virtual, to cloud. This paper examines the dynamics of the hybrid cloud and the challenges introduced at both the business and technical levels.
ESG: Leveraging the agility of DevOps processes to secure hybrid clouds
Securing cloud infrastructure requires not only understanding what is technically different about today’s data center but also fully embracing and exploiting the benefits of DevOps as a means to codify cybersecurity practices and controls. Download this ESG white paper to learn how you can efficiently improve your organization’s cybersecurity posture while also enabling the speed of business.
Assessment of Gartner’s market guide for cloud workload protection platforms
As the requirements for cloud services and container use cases increase, so too does the attack surface that InfoSec and DevOps teams must address as a unified security posture to keep the business safe from harm. Download this paper to find out more about the core capabilities and architectural considerations for cloud workload protection platforms.
Endless possibilities
The cloud brings endless opportunity to innovate. It changed the way we do customer relationship management, analyze and share data, and deploy new services. The cloud will also change how you protect your organization. It is here, in the cloud, where you have the best chance to prevent, detect, and respond to today’s sophisticated threats before they become a breach. This ebook looks at how CISOs can leverage the power of the cloud – including advanced analytics, threat intelligence, massive scalability, and more – to achieve better protection, better performance, and better value
Isolate advanced email attacks
This solution brief details how you can stop advanced email attacks by insulating users from spear phishing, credential theft, and ransomware attacks.
Deploy Symantec Cloud Workload Protection for Storage
Read this eBook to learn more about how CWP for Storage can help your organization implement a robust security strategy that will enhance the protection of your stored data from malware and advanced threats. Discover how the flexibility and scalability of CWP for Storage helps protect your data in Amazon S3 buckets, and enables the secure adoption of containers and serverless technologies, including AWS Lambda. It also provides details on why Snapper— a New Zealand-based company that develops custom account-based payment and ticketing solutions—chose to adopt CWP for Storage to enhance the protection of their data in Amazon S3.
Cloud security: The honeypot project
Now as much as ever, it is critical for businesses to take a defense in-depth approach to cloud security that takes advantage of native controls, security best practices and additional security technologies and services that can detect, prevent and respond to the threats that can impact your cloud environment.
Beginner’s guide to AWS security monitoring
As organizations around the world shift their workloads to Amazon Web Services (AWS) and other popular cloud infrastructure-as-a-service (IaaS) providers, concerns about cloud security continue to rise. According to a 2018 Cloud Security Report from Cybersecurity Insiders, 91% of respondents are concerned about cloud security, an increase of 11% over last year’s report. This report will examine a number of these concerns in detail, and specifically address how to avoid making costly mistakes that can leave data exposed.
Insights for infrastructure
Download this product brief and discover how SII offers an easy install within minutes—available as a free download, detailed investigations through granular metrics, and seamless monitoring and troubleshooting.
How to get your cloud migration strategy right
There are ways to navigate cloud migration more effectively. Register for your complimentary copy of the ebook How to Get Your Cloud Migration Strategy Right. You’ll learn how to make your cloud migration journey successful.
Gartner: 2018 Market Guide for Vulnerability Assessment
According to Gartner, “the vulnerability assessment (VA) market is mature, but is being challenged by the need to cover changing device demographics and emerging technologies and better represent true risk.” Gartner addresses these considerations and others in the 2018 Market Guide for Vulnerability Assessment, providing insights that will help you evaluate vendors and improve your security program.
Clouds are Secure: Are you Using Them Securely
According to Gartner, “CIOs need to ensure their security teams are not holding back cloud initiatives with unsubstantiated cloud security worries. Instead, they should encourage their teams to apply imagination and energy to develop new approaches to securely and reliably leverage the benefits of SaaS, PaaS and IaaS.” By reading, “Clouds Are Secure: Are You Using Them Securely?,” you will gain insight into Gartner’s recommended practices for effective and secure adoption of public cloud services.
Cyber Exposure for Dummies
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Reducing Cyber Exposure from Cloud to Containers: 5 Key Learnings from the CISO POV
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
3 Reasons Why DevOps Is a Game-Changer for Security whitepaper
The DevOps model drives digital transformation and the rapid delivery of new software products and services. However, this process largely takes place outside the purview of information security (InfoSec), often without their involvement. As a result, security teams struggle to keep pace. This whitepaper explores the intersection of DevOps and InfoSec, offering three reasons why security organizations will benefit by combining these two practices.
Quantifying the Attacker’s First-Mover Advantage
Tenable Research’s analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to find out more about Tenable Research’s analysis of the 50 most prevalent vulnerabilities, get recommendations on how to reduce the attacker’s seven-day window of opportunity, and learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attacker’s first-mover advantage.

Editorial

SC Media
Securing the endpoint and cloud at COVID speed
SASE — pronounced “sassy” — is a type of architecture that protects your data in the cloud and is built on multiple, existing technologies. SASE, or Secure Access Service Edge, sits in the cloud and includes cloud access security broker, DNS-layer security, secure web gateway, zero trust network access, software-defined WANs, and a firewall-as-a-service with intrusion protection system software.
SC Media
There’s no end to endpoint security
With the mad rush of CISOs and CIO to implement a digital transformation of companies as workers were forced to work from home, security teams today are now facing a monumental problem. How do you backfill your due diligence and ensure your cloud and remoter workers’ networks are safe and secure months after fast-tracking the transfer of computing and storage resources to the cloud, fog and employees’ homes?
Managing invisible assets
In the "good old days of computing," if you wanted a new server you needed to requisition and purchase the hardware, software and services; convince the IT department to install and configure it as a computing or storage device; and then you'd have a physical box for your needs - assuming there was space in the server cabinet or in the raised-floor server room. As part of the IT department's asset management program, the physical box would be counted and managed by IT pros. Today many companies and departments are using cloud-based resources that can be created and destroyed with a few keystrokes - and often the IT teams might not even know of the asset's existence. There could be no records of the new resources and perhaps insufficient data security, if any. This eBook looks at the challenge CISOs and the security teams face in identifying cloud-based assets, determining what content lives there and arranging for appropriate security. We'll address what constitutes a cloud asset, how companies can manage them, and why this is a mission-critical task to the enterprise.
SC Media
Pandemic causing shifts to cloud responsibilities
We are seeing some major changes in cloud activity over the past several months. Not surprisingly, these activities correspond to the growth of the COVID-19 pandemic. As employees move from on-prem offices to home-based offices, companies are expanding their cloud usage to serve not only as an interim storage location for IT to perform security scans on data coming from their employees’ home networks, but also as a way to better manage loads on their own networks by taking advantage of cloud- and fog-based assets.
SC Media
Defending the cloud
This eBook looks at how cloud-based network detection and response technology manages encrypted data packets and other cloud-based data activity, as well as how it responds to possible breaches.
SC Media
THREAT HUNTING IN THE CLOUD
Threat hunting in the cloud – a search-and-destroy mission for attacks against assets the CISO neither owns nor manages directly – has become the latest challenge for IT departments that have limited staff resources but significant cloud exposure.
SC Media
Defending the cloud
This eBook looks at how cloud-based network detection and response technology manages encrypted data packets and other cloud-based data activity, as well as how it responds to possible breaches.