cloud security

Magecart compromised 17,000+ sites through unsecured Amazon S3 buckets
We often hear about misconfigured Amazon S3 buckets exposing sensitive business and customer data, but there’s another present danger: Magecart attackers have been …

Prioritizing security efforts is key to data security in the cloud
32% of healthcare organizations store a wide range of sensitive data in the cloud, including healthcare data and personally identifiable information (PII) of customers and …

Do cloud apps make you a target for cyber attacks?
Almost half (49%) of businesses believe cloud apps make them a target for cyber attacks, a Thales research reveals. Surveying 1,050 IT decision makers globally, Thales’ 2019 …

What is and what is not working for security operations teams in securing cloud data
Security professionals continue to face a number of major challenges as more organizations move legacy IT operations to cloud infrastructure and applications, and traditional …

Over reliance on public cloud vendor security puts data and companies at risk of breach
As global organizations increasingly move critical applications, regulated customer data and development work into public cloud environments, 36 percent say the number one …

Cloud security exacerbated by immature security practices
Enterprises are struggling to keep up with the rapid expansion of cloud within their businesses, according to Symantec. Surveying 1,250 security decision makers across the …

Organizations more likely to accelerate business when protecting their cloud data
Cloud services are the most significant advance in IT since the introduction of the internet itself, and most organizations today benefit from the collaboration, scalability …

What does runtime container security really mean?
End-to-end protection for containers in production is required to avoid the steep operational and reputational costs of data breaches. As news of container attacks and fresh …

Embrace chaos to improve cloud infrastructure resilience
Netflix is a champion of using chaos engineering to improve the resilience of its cloud infrastructure. That’s how it ensures its customers don’t have their Stranger Things …

Scientists uncover vulnerability in FPGAs, affecting cloud services and IoT
Field-programmable gate arrays (FPGAs) are, so to say, a computer manufacturer’s “Lego bricks”: electronic components that can be employed in a more flexible …

The security challenges of managing complex cloud environments
Holistic cloud visibility and control over increasingly complex environments are essential for successful deployments in various cloud scenarios, a Cloud Security Alliance and …

Executing a multi-cloud strategy: Crawl, walk, run
Despite many challenges, enterprises are increasingly adopting cloud computing in an effort to become more agile, lower IT costs, and have the ability to scale. Most of those …
Featured news
Resources
Don't miss
- How to find out if your AI vendor is a security risk
- From likes to leaks: How social media presence impacts corporate security
- Review: The Ultimate Kali Linux Book, Third Edition
- Enzoic AD Lite Password Audit Report
- WhatsApp vulnerability could be used to infect Windows users with malware (CVE-2025-30401)