Protection from Malware and AWS Bucket Leaks Cloud Advocate
You can’t control the weather. But you can safeguard your downstream infrastructure investment. Read More HERE…
You can’t control the weather. But you can safeguard your downstream infrastructure investment. Read More HERE…
NEW on AWS Lambda: Learn how to package up your serverless functions as container images. Read More HERE…
“Cloud security is simple, absolutely simple. Stop over complicating it.” This is how I kicked off a presentation I gave at the CyberRisk Alliance, Cloud Security Summit on Apr 17 of this year. And I truly believe that cloud security is simple, but that does not mean easy. You need the right strategy. As I…
The post Cloud Security Is Simple, Absolutely Simple. appeared first on . Read More HERE…
Things fail. It happens. A core principle of building well in the AWS Cloud is reliability. Dr. Vogels said it best, “How can you reduce the impact of failure on your customers?” He uses the term “blast radius” to describe this principle. One of the key methods for reducing blast radius is the AWS account…
The post Automatic Visibility And Immediate Security with Trend Micro + AWS Control Tower appeared first on . Read More HERE…
The acceleration of in-house development enabled by public cloud and Software-as-a-Service (SaaS) platform adoption in the last few years has given us new levels of visibility and access to data. Putting all of that data together to generate insights and action, however, can substitute one challenge for another. Proprietary protocols, inconsistent fields and formatting combined…
The post Trend Micro Integrates with Amazon AppFlow appeared first on . Read More HERE…
If we run a contest for Mr. Popular of Amazon Web Services (AWS), without a doubt Amazon Simple Storage Service (S3) has ‘winner’ written all over it. However, what’s popular is not always what is critical for your business to focus on. There is popularity and then there is dependability. Let’s acknowledge how reliant we…
The post The AWS Service to Focus On – Amazon EC2 appeared first on . Read More HERE…
Containers provide a list of benefits to organizations that use them. They’re light, flexible, add consistency across the environment and operate in isolation. However, security concerns prevent some organizations from employing containers. This is despite containers having an extra layer of security built in – they don’t run directly on the host OS. To make…
The post Smart Check Validated for New Bottlerocket OS appeared first on . Read More HERE…
For modern organizations, speed and agility is the key to success – built on enhanced IT efficiency and performance driven by the cloud. Anything less could see your business outpaced by the competition. As always, security must be a priority when migrating to the cloud, but network teams are being let down by existing tools….
The post Migrating Network Protection to the Cloud with Confidence appeared first on . Read More HERE…
The inaugural AWS Cloud security conference—AWS re:Inforce—was held in Boston this week. Well over 8,000 attendees descended on the Boston Convention and Exhibition Center for two days jammed packed with security education and cloud content. This was a very interesting conference because the dynamics of the attendees felt very different from typical AWS events. Usually…
The post AWS re:Inforce 2019 re:Cap appeared first on . Read More HERE…
This week a new vulnerability was published (CVE-2019-5736) that highlights everything bad and good about containers. Simply put, this vulnerability can be exploited using an infected container to attack the host. It’s a real world example of a breakout attack that has long been a major concern in virtualized and container environment. Here, the attack…
The post Attacking Containers and runC appeared first on . Read More HERE…