Cloud security posture confidence is high, yet most IT pros have experienced a cloud-related breach

OpsCompass announced the results of a report it conducted on cloud security posture and management challenges. The report is based on survey responses from 253 full-time, US-based, IT professionals who develop, and either deploy or manage enterprise cloud applications or infrastructure. “These findings confirm what we’ve observed firsthand — cloud security is a major challenge,” […]

Continue Reading

“Network Security” the Biggest Concern for Public Cloud Adoption, Reveals Survey

Cloud misconfigurations represent something that’s plaguing many organizations’ cloud adoption efforts. For example, a 2020 report found that 91% of cloud deployments contained at least one misconfiguration that left organizations exposed to potential digital threats. Those weaknesses contributed to more than 200 data breaches between 2018 and 2020, noted SC Magazine, with those security incidents […]

Continue Reading

Most organizations fail to fix cloud misconfiguration issues in a timely manner

A significant majority of companies that move to multi-cloud environments are not properly configuring their cloud-based services, Aqua Security reveals. According to the report findings, these misconfigurations, for example leaving bucket or blog storage open, can open companies up to critical security breaches. Reflecting the overwhelming amount of configurations practitioners must address, even when companies […]

Continue Reading

Cloud Misconfiguration is Still the Leading Source of Cloud Data Violations

  Almost everybody by now is workings from home and 84 percent are worried that new security vulnerabilities have been generated with the quick move towards 100 percent remote working.  Cloud service providers built their administration panels’ user interface purposefully to mislead consumers and charge for more services than originally intended.  Although it was never […]

Continue Reading

Improper cloud IAM leaving organizations at risk

There is an industry-wide cloud permissions gap crisis, leaving countless organizations at risk due to improper identity and access management (IAM), a CloudKnox Security report reveals. The report findings underscore the fact that attackers can leverage over-privileged identities to traverse laterally, elevate permissions and cause extensive data exfiltration. “The focus on digital transformation over the […]

Continue Reading

Using Salesforce? Here are 5 security and compliance considerations

When it comes to mission-critical cloud applications, today’s security teams have a laundry list of different focus areas. From ensuring cloud providers deliver adequate protection and analyzing baseline activity to examining interconnected systems and understanding data flows, teams are stretched thin. With so many competing priorities, it’s no wonder they have a difficult time answering […]

Continue Reading

The SOC is blind to the attackable surface

A security operations center (SOC) is the central nervous system of any advanced cybersecurity program. Yet even the most well-funded, highly organized and properly equipped SOC is often no match for a simple misconfiguration error. Organizations have piled security controls upon security controls, and still remain largely blind to the most serious threats they face. […]

Continue Reading