Our partner Alert Logic provides managed security and compliance solutions for over 3,000 customers across the globe. As part their cybersecurity research practice they review threats and attacks against their vast customer base looking for insight to share in their annual Cloud Security Report.
It’s like the Wild West out there for companies trying to protect their data and systems from cyber criminals. Data breaches, with multi-million dollar consequences are happening every day. Cyber criminals are becoming savvier, and their costs are going down. C-Levels are being held accountable for damaging and costly hacks and executives are scrambling to recruit the best security talent to protect their business.
If you are a company that has joined the DevOps movement to integrate code and infrastructure deployment, it's likely you (or someone in your organization) have had some concerns about information security. In an effort to release products faster or reduce time to market, information security gaps can become a problem for any company. Security monitoring tools haven’t been able to keep up with the fast-paced changes being made by DevOps when releasing new features or products.
Over 80% of cyberattacks use a multi-vector approach to disable a network or servers.
The WTIA recently hosted an IT security panel discussion on data breaches and how companies can work to prevent them.
Industry experts are predicting a huge growth rate for Hybrid Cloud.
Venom, announced recently by security intelligence firm CrowdStrike, is a vulnerability affecting the floppy drive emulation code used by many virtualization platforms. It looks like Venom will not be as big as Heartbleed, the vulnerability discovered last year that allowed hackers to grab data from the memory of servers running affected versions of the open-source OpenSSL encryption software. However, VENOM is of particular interest to cloud-users everywhere as it is one of a very few vulnerabilities at the hypervisor that compromises the security through isolation promise of virtualization-based cloud infrastructure.
It’s time for organizations of all sizes to prepare for a more complex landscape of cyber threats: very large volumetric attacks, application attacks that target specific critical resources, and low and slow attacks that may occur below the radar.
Q1 Panel Event Recap: Cloud vs Colo Smackdown New Infographic: Security-as-a-Service Featured Blog: Cloud Closed - A Rundown of Shutdowns Featured Article: The Allure of Singapore - The World's Second Gateway to China
Cybercrime is on the rise. Companies, large and small, are falling victim to a fully weaponized web that provides bad actors with simple tools to perform their dirty cyberdeeds. Thanks to the Internet’s inherent anonymity, widespread reach, and disjointed law enforcement status Cybercriminals have a lot to gain – and enterprises have a lot to lose.
As part of the WTIA’s IT Security event series, they hosted a Privacy of the Cloud panel discussion at KPMG last week. Our very own Director of Cloud Strategy, Lee Pallat, was one of the panelists, along with Co-Founder of Déjà Vu Security, Akshay Aggarwal, Founder of Rhino Security Labs, Benjamin Caudill, and Manager at KPMG, Kerri Murphy. If you missed the event, you can read a recap on our blog, or watch the video. Interesting discussion about privacy and security related to the cloud and how it’s changing businesses, IT departments, and consumers.
We wanted to recap a few of the highlights from our blog, which included a fair amount of M&A activity, new cloud related technology products, and a bit of Shellshock.