Hybrid Microsoft network/cloud legacy settings may impact your future security posture
CSO Online » Cloud Security
by
10M ago
Once upon a time, the boundary that I worried about and considered that I was responsible for stopped at my Active Directory domain and at the firewall that protected it. Then the boundary of my network moved from the computers under my control to the internet and the connected devices and cloud applications that I now have access to and am linked into. We went from where the stakeholders of the firm were resistant to anything being in the cloud, to where we are now where we know we are half in the cloud and half still on premises. No longer can I merely worry about the computers listed in my ..read more
Visit website
Western Digital blocks unpatched My Cloud devices
CSO Online » Cloud Security
by
10M ago
Western Digital has blocked devices running vulnerable firmware versions from accessing its cloud services, the company said in an advisory. The move comes about a month after the company released firmware updates for its My Cloud product line to address a critical path traversal bug that leads to remote code execution (RCE). “Devices running unpatched firmware versions will not be able to connect to Western Digital cloud services starting June 15, 2023, and users will not be able to access their data until the device updates to the latest firmware,” the company said. To read this article in f ..read more
Visit website
Google Cloud launches Cryptomining Protection Program
CSO Online » Cloud Security
by
11M ago
Google Cloud has launched its Cryptomining Protection Program for Security Command Center (SCC) Premium customers with up to $1 million to cover unauthorized Google Cloud compute expenses associated with undetected cryptomining attacks. SCC Premium customers will have access to the new product for free. SCC Premium works with a pay-as-you-go pricing, and as one-year and multi-year fixed-price subscriptions.  According to Google Cybersecurity Action Team (GCAT) September 2022 Threat Horizons Report, threat actors frequently targeted weak and default passwords to access Google Clo ..read more
Visit website
Cisco spotlights generative AI in security, collaboration
CSO Online » Cloud Security
by
11M ago
Cisco Security Cloud and Webex will sport new features supported by its home-grown generative AI ..read more
Visit website
Shadow IT is increasing and so are the associated security risks
CSO Online » Cloud Security
by
11M ago
Despite years of modernization initiatives, CISOs are still contending with an old-school problem: shadow IT, technology that operates within an enterprise but is not officially sanctioned — or on the radar of — the IT department. Unvetted software, services, and equipment can be nightmare fuel for a security team, potentially introducing a lurking host of vulnerabilities, entry points for bad actors, and malware. In fact, it is as big a problem as ever and may even worsen. Consider the figures from research firm Gartner, which found that 41% of employees acquired, modified, or created technol ..read more
Visit website
SAFE Security claims to predict data breaches with new generative AI offering
CSO Online » Cloud Security
by
11M ago
AI-based cyber risk management SaaS vendor SAFE Security has announced the release Cyber Risk Cloud of Cloud – a new offering it claims uses generative AI to help businesses predict and prevent cyber breaches. It does so by answering questions about a customer’s cybersecurity posture and generating likelihoods for different risk scenarios. These include the likelihood of a business suffering a ransomware attack in the next 12 months and the dollar impact of an attack, the firm added. This enables organizations to make informed, prognostic security decisions to reduce risk, SAFE Security said ..read more
Visit website
Trellix, Netskope announce new Amazon Security Lake support to enhance threat detection, remediation
CSO Online » Cloud Security
by
11M ago
Cybersecurity vendors Trellix and Netskope have announced new support for Amazon Security Lake from AWS, which became generally available on May 30. Trellix customers can now integrate their security data lake into the Trellix XDR security operations platform to enhance detection and response capabilities for their AWS environments. Meanwhile, Netskope customers can export logs from the Netskope Intelligent Security Service Edge (SSE) platform to Amazon Security Lake to improve visibility and threat remediation. AWS launched Amazon Security Lake in November last year at the AWS re:Invent 2022 ..read more
Visit website
Credential harvesting tool Legion targets additional cloud services
CSO Online » Cloud Security
by
11M ago
A commercial malware tool called Legion that hackers deploy on compromised web servers has recently been updated to extract credentials for additional cloud services to authenticate over SSH. The main goal of this Python-based script is to harvest credentials stored in configuration files for email providers, cloud service providers, server management systems, databases, and payment systems. These hijacked resources enable the attackers to launch email and SMS spam campaigns. "This recent update demonstrates a widening of scope, with new capabilities such the ability to compromise SSH servers ..read more
Visit website
Axiado releases new security processors for servers and network appliances
CSO Online » Cloud Security
by
1y ago
Security processor provider Axiado has announced the availability of two new trusted compute units (TCUs) to help detect ransomware and other cyberattacks on servers and infrastructure elements in cloud data centers, 5G networks, and network switches. Dubbed AX3000 and AX2000, these TCUs are AI-powered hardware security platform solutions that, the company says, integrate all security functions within a single system-on-chip (SoC) module. “Products such as Axiado’s TCU are important developments in the market, as they answer a specific need for high-level and multi-function hardware security d ..read more
Visit website
Aviatrix is transforming cloud network security with distributed firewalling
CSO Online » Cloud Security
by
1y ago
Cloud networking solutions provider Aviatrix has launched a distributed cloud firewall offering in a bid to strengthen network security for application traffic on multicloud environments. The offering is targeted at distributing both inspection and policy enforcement into the original path of application traffic, eliminating the need to redirect traffic to centralized firewalls or other network security services. “Aviatrix is the first to deliver a distributed cloud firewall,” said Rod Stuhlmuller, vice president of solutions marketing at Aviatrix. “Customers are no longer constrained by last ..read more
Visit website

Follow CSO Online » Cloud Security on FeedSpot

Continue with Google
Continue with Apple
OR