October 23, 2023
Via: InformationWeekCloud computing has revolutionized the way enterprises deploy and manage critical applications. It ensures unparalleled agility in terms of hosting and scaling an IT infrastructure. With its distributed nature and unlimited on-demand compute power, the cloud enables frictionless real-time access […]
May 18, 2023
Via: FCWA Government Accountability Office report examining the implementation of cloud security practices at four department-level agencies found that none of them have fully applied those practices to date. The report, released on Thursday, describes the efforts at the departments of […]
April 4, 2023
Via: FCWThe IRS’s Enterprise Case Management System did not always meet established cloud security requirements, the Treasury’s Inspector General for Tax Administration found. In a new report, the IG found the IRS did not meet every agency guideline for cloud operations, […]
February 24, 2023
Via: FCWDepartment of Defense officials who authorized the use of commercial cloud services across components of the agency did not review all required documentation needed to determine potential security concerns, leaving DOD’s armed forces unaware of vulnerabilities and cybersecurity risks across […]
February 1, 2023
Via: CSO OnlineThe two biggest cloud security risks continue to be misconfigurations and vulnerabilities, which are being introduced in greater numbers through software supply chains, according to a report by Sysdig. While zero trust is a top priority, data showed that least […]
December 6, 2022
Via: Dark ReadingAlgoSec, a global cybersecurity leader in securing application connectivity, announced today that it has acquired Prevasio, a SaaS cloud-native application protection platform (CNAPP) that includes an agentless cloud security posture management (CSPM) platform, anti-malware scan, vulnerability assessment and dynamic analysis […]
August 12, 2022
Via: Dark ReadingMany security practitioners take their eye off cloud and software-as-a-service (SaaS) security based on the faulty assumption that the providers are inherently secure. While most providers are, the cloud is so flexible and customizable that every organization might open different […]
Cloud Computing, Cybersecurity, Tech
October 12, 2021
Via: Dark ReadingGoogle has launched a new service group — the Google Cybersecurity Action Team — to provide strategic advisory, compliance, threat intelligence, and incident response services aimed at helping government and corporate clients tackle complex cybersecurity efforts, the company announced today […]
September 14, 2021
Via: CSO OnlineAs companies move more and more of their infrastructure to the cloud, they’re forced to shift their approach to security. The security controls you need to put in place for a cloud-based infrastructure are different from those for a traditional […]
Cloud Computing, Cybersecurity, Tech
August 5, 2021
Via: CSO OnlineEarlier this week, the US National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) issued a joint document entitled Kubernetes Hardening Guidance. Kubernetes is an open-source orchestration system that relies on containers to automate the deployment, scaling […]
Cloud Computing, Cybersecurity, Tech
August 4, 2021
Via: StateScoopThe sharp uptick in successful cyber attacks during the COVID-19 pandemic serves as a stark reminder to government leaders that their existing security strategies still leave adversaries plenty of vulnerabilities to exploit. According to former White House security advisor Dan […]
July 20, 2021
Via: CSO OnlineIn March 2021 Google Cloud announced a new offering called Risk Protection Program, which is designed to help its cloud customers reduce security risk and connect with Google’s insurer partners, Allianz Global Corporate & Specialty and Munich Re. The insurers […]
May 6, 2021
Via: ZDnetMicrosoft president Brad Smith has announced a new pledge for EU commercial customers, allowing them to store and process most of their data within the EU by the end of 2022. With the transatlantic Privacy Shield data transfer framwork in […]
March 2, 2021
Via: Dark ReadingIdentities have become the primary attack surface in the cloud. However, they remain largely unprotected because traditional security tools were designed to protect the network perimeter, not user and service accounts. Gartner predicts that by 2023, 75% of cloud security […]
Cloud Computing, Cybersecurity
January 27, 2021
Via: ZDnetGoogle has announced general availability of BeyondCorp Enterprise, a new security service from Google Cloud based on the principle of designing networks with zero trust. As US security companies come to terms with the SolarWinds supply chain hack, Google and […]
December 7, 2020
Via: ZDnetMicrosoft is taking the wraps off Azure Government Top Secret, a new cloud offering for those who need to manage top-secret classified data. The new offering joins the existing family of Azure clouds available to U.S. government users, including Azure […]
August 31, 2020
Via: CSO OnlineAlthough nearly 30 years old, cloud computing is still a “new” technology for most organizations. The cloud promises to reduce costs and increase efficiencies through storage and management of large repositories of data and systems that are theoretically cheaper to […]
August 17, 2020
Via: CSO OnlineAs enterprises race to adopt cloud technology, they also encounter a combination of new possible threats from the rapid and frequently unorganized deployment of different cloud-based technologies. Particular concerns surround the adoption of so-called hybrid cloud technologies, Sean Metcalf, founder […]
July 14, 2020
Via: CSO OnlineGoogle is taking important steps to secure customer data in the cloud when used by applications and prevent potentially unauthorized access to sensitive computing workloads run by government institutions and their contractors. To meet the strict security and compliance requirements […]
May 19, 2020
Via: CSO OnlineMany organizations are automating their cloud infrastructure deployments through code. This allows them to establish a secure configuration baseline early in their DevOps lifecycle, but the security posture of most cloud resources later drifts due to undocumented changes that often […]