Please turn on your JavaScript for this page to function normally.
Qualys Multi-Vector EDR
New infosec products of the week: July 31, 2020

Qualys unveils Multi-Vector EDR, a new approach to endpoint detection and response Traditional EDR solutions singularly focus on endpoints’ malicious activities to hunt and …

Public cloud environments leave numerous paths open for exploitation

As organizations across industries rapidly deploy more assets in the public cloud with Amazon, Microsoft, and Google, they’re leaving numerous paths open for exploitation, …

Amazon Fraud Detector: Use machine learning in the fight against online fraud

Amazon Fraud Detector is a fully managed service that makes it easy to quickly identify potentially fraudulent online activities like online payment and identity fraud. Using …

Sonrai Dig maps relationships between identities and data inside public clouds

Sonrai Security announced the Governance Automation Engine for Sonrai Dig, re-inventing how customers ensure security in AWS, Azure, Google Cloud and Kubernetes by …

Attackers exploit Twilio’s misconfigured cloud storage, inject malicious code into SDK

Twilio has confirmed that, for 8 or so hours on July 19, a malicious version of their TaskRouter JS SDK was being served from one of their AWS S3 buckets. “Due to a …

Function-as-a-Service
Using confidential computing to protect Function-as-a-Service data

Organizations are embracing the power of Function-as-a-Service (FaaS). FaaS can be viewed as a very positive and beneficial result coming from years of data successfully …

AWS
AWS Snowcone: Ultra-portable, secure edge computing, storage, and data transfer device

Amazon Web Services announced AWS Snowcone, a new small, ultra-portable, rugged, and secure edge computing and data transfer device. At under 5 lbs and able to fit in a …

cloud
How to implement least privilege in the cloud

According to a recent survey of 241 industry experts conducted by the Cloud Security Alliance (CSA), misconfiguration of cloud resources is a leading cause of data breaches. …

Amazon AppFlow
Amazon AppFlow automates bidirectional data flows between AWS and SaaS apps

Amazon AppFlow is a fully managed service that provides an easy, secure way for customers to create and automate bidirectional data flows between AWS and SaaS applications …

BYOK
Multi-cloud key management and BYOK

Cloud providers such as Google Cloud Platform, AWS, and Microsoft Azure work hard to be the service provider of choice for enterprise customers. They often push the envelope …

Ping Identity PingID multi-factor authentication now available in AWS Marketplace

Ping Identity, the Intelligent Identity solution for the enterprise, announced the availability of PingID multi-factor authentication (MFA) in AWS Marketplace. Customers can …

Amazon Detective
Amazon Detective: Analyze and visualize security data to get to the root cause of security issues

Amazon Detective is a new security service that makes it easy for customers to conduct investigations into security issues across their AWS workloads. Identify the root cause …

Don't miss

Cybersecurity news