Five Steps to a Secure Cloud Architecture
Fugue
by Josh Stella
4M ago
Cloud computing cyberattacks don’t play out like the scenes from Hollywood thrillers. No one is slowly lowering Tom Cruise into a preselected target’s secure data center equipped with ultrasensitive noise, temperature and motion detectors so he can steal a specific file ..read more
Visit website
9 Questions You Should Ask About Your Cloud Security
Fugue
by Josh Stella
4M ago
In order for business leaders and cybersecurity professionals to gain the knowledge they need to thwart the hackers constantly targeting their cloud infrastructure and applications, they need to think like General George S. Patton (or rather like George C. Scott, the actor who won the Best Actor Oscar for his portrayal of the general in the 1970 film “Patton ..read more
Visit website
The One Cloud Threat Everyone Is Missing
Fugue
by Josh Stella
4M ago
Ask security professionals to name the biggest threat to their organizations’ cloud environments, and most won’t hesitate to give a one-word answer: misconfigurations. Technically, they’re not incorrect, yet they’re defining “misconfiguration” much too narrowly. They’re likely thinking of an Amazon S3 bucket that’s left exposed or a misconfigured security group rule. While identifying and remediating misconfigurations must be a priority, it’s important to understand that misconfigurations are but one means to the ultimate end for attackers: control plane compromise, which has played a central ..read more
Visit website
Automatically Syncing Custom Cloud Security Rules to Fugue via CI/CD
Fugue
by
4M ago
One of Fugue's most powerful features is the ability to run custom rules against cloud infrastructure or infrastructure as code (IaC). This allows you to enforce enterprise policies such as tagging requirements, security measures, or other internal best practices ..read more
Visit website
Five Universal Fundamentals for Securing Your Cloud
Fugue
by Josh Stella
4M ago
Organizations That Have Implemented Effective Cloud Security Programs Share Characteristics That Any Enterprise Can Emulate ..read more
Visit website
Using Fugue to Check the Security of Fugue's Infrastructure as Code
Fugue
by
4M ago
Here at Fugue, we think it's important to practice what we preach. To that end, we're dogfooding Fugue! That means we use our own product to evaluate the compliance and security of our own running cloud infrastructure and infrastructure as code (IaC) with the same policies. In this blog post, we'll dive into how we set up a CI/CD pipeline that uses Fugue to scan the IaC underlying Fugue ..read more
Visit website
Why Ransomware Attacks Steer Clear of the Cloud
Fugue
by Josh Stella
4M ago
Ransomware made news headlines worldwide earlier this month after a successful attack against one of Toyota Motor Corp.’s parts suppliers forced the automaker to shut down 14 factories in Japan for a day, halting their combined output of around 13,000 vehicles.  ..read more
Visit website
Fugue Achieves AWS Security Competency Status
Fugue
by
4M ago
Fugue recently achieved Amazon Web Services (AWS) Security Competency status. Our customers, including Red Ventures, Ericsson, and Wabtec use Fugue to establish cloud security visibility and policy-based governance across the software development life cycle. Attaining this designation from AWS recognizes that Fugue demonstrates proven technology that helps customers achieve their cloud security goals ..read more
Visit website
A
by
ago
A ..read more
Visit website
A
by
ago
A ..read more
Visit website

Follow Fugue on FeedSpot

Continue with Google
Continue with Apple
OR