cloud computing
![Kennedy Torkura](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/16131056/kennedy_torkura-2-mitigant-400x200.jpg)
Maintaining consistent security in diverse cloud infrastructures
As cloud infrastructures become increasingly API-driven and dynamically spread across expansive attack surfaces, achieving clarity proves difficult. Compounding this challenge …
![AWS](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/02145128/aws-depth-400x200.jpg)
Attackers can turn AWS SSM agents into remote access trojans
Mitiga researchers have documented a new post-exploitation technique attackers can use to gain persistent remote access to AWS Elastic Compute Cloud (EC2) instances (virtual …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095943/cloud-400x200.jpg)
How CISOs navigate security and compliance in a multi-cloud world
Due to the increasing importance of multi-cloud and the intricate nature of cloud infrastructure, obtaining a comprehensive understanding of the various cloud workloads …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094406/cloud1-400x200.jpg)
Organizations face an uphill battle to keep their sensitive data secure
On average, organizations store 61% of their sensitive data in the cloud, and most have experienced at least one cybersecurity breach (90%), threat (89%) and/or theft of data …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093806/cloud1-400x200.jpg)
Application and cloud security is a shared responsibility
Cloud environments and application connectivity have become a critical part of many organizations’ digital transformation initiatives. In fact, nearly 40% of North American …
![cloud complexity](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09102001/cloud-complexity-400x200.jpg)
Hybrid cloud storage security challenges
Companies are challenged with more complex hybrid IT environments. They are raising budgets to fend off cyberattacks and keep up as production environments continue to …
![Rackspace](https://img.helpnetsecurity.com/wp-content/uploads/2022/12/05105934/rackspace-clouds-400x200.jpg)
Rackspace Hosted Exchange outage was caused by ransomware
Rackspace has finally confirmed the cause of the ongoing outage of its Hosted Exchange service: it’s ransomware. “As you know, on Friday, December 2nd, 2022, we …
![Rackspace](https://img.helpnetsecurity.com/wp-content/uploads/2022/12/05105934/rackspace-clouds-400x200.jpg)
Rackspace Hosted Exchange service outage caused by security incident
Cloud computing company Rackspace has suffered a security breach that has resulted in a still ongoing outage of their Hosted Exchange environment. “In order to best …
![cloud storage](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102525/cloud_storage-400x200.jpg)
Top 4 priorities for cloud data protection
Recent BigID research found that 86% of organizations use multiple cloud platforms to store their data- across IaaS, PaaS, and SaaS. As the reliance on cloud services …
![Cloud](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/20170619/cloud-target-400x200.jpg)
Increased security driving investments in cloud computing
Aptum has announced a report which examines the complexities inherent in hybrid cloud environments and their implications on security, data governance, compliance and disaster …
![hybrid work](https://img.helpnetsecurity.com/wp-content/uploads/2021/11/26090703/hybrid_3_hns-400x200.jpg)
DaaS might be the future of work
The move to hybrid work is on. And to support and accelerate it, IT executives are counting on Desktop as a Service (DaaS). According to the results of a Pulse survey …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093341/crypto-coin-400x200.jpg)
Malicious actors targeting the cloud for cryptocurrency-mining activities
Trend Micro announced a report revealing a fierce, hour-by-hour battle for resources among malicious cryptocurrency mining groups. “Just a few hours of compromise could …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege