Please turn on your JavaScript for this page to function normally.
AWS
Essential features of security automation for the AWS platform

DevSecOps tactics and tools are dramatically changing the way organizations bring their applications to fruition. Having a mindset that security must be incorporated into …

face
Maximizing data privacy: Making sensitive data secure by default

Maximizing data privacy should be on every organization’s priority list. We all know how important it is to keep data and applications secure, but what happens when …

Modshield SB application firewall now available in the AWS Marketplace

StrongBox IT released its flagship application firewall – Modshield SB, now available in the AWS Marketplace on a cloud subscription model and a Bring Your Own License …

Qualys Multi-Vector EDR
New infosec products of the week: July 31, 2020

Qualys unveils Multi-Vector EDR, a new approach to endpoint detection and response Traditional EDR solutions singularly focus on endpoints’ malicious activities to hunt and …

Public cloud environments leave numerous paths open for exploitation

As organizations across industries rapidly deploy more assets in the public cloud with Amazon, Microsoft, and Google, they’re leaving numerous paths open for exploitation, …

Amazon Fraud Detector: Use machine learning in the fight against online fraud

Amazon Fraud Detector is a fully managed service that makes it easy to quickly identify potentially fraudulent online activities like online payment and identity fraud. Using …

Sonrai Dig maps relationships between identities and data inside public clouds

Sonrai Security announced the Governance Automation Engine for Sonrai Dig, re-inventing how customers ensure security in AWS, Azure, Google Cloud and Kubernetes by …

Attackers exploit Twilio’s misconfigured cloud storage, inject malicious code into SDK

Twilio has confirmed that, for 8 or so hours on July 19, a malicious version of their TaskRouter JS SDK was being served from one of their AWS S3 buckets. “Due to a …

Function-as-a-Service
Using confidential computing to protect Function-as-a-Service data

Organizations are embracing the power of Function-as-a-Service (FaaS). FaaS can be viewed as a very positive and beneficial result coming from years of data successfully …

AWS
AWS Snowcone: Ultra-portable, secure edge computing, storage, and data transfer device

Amazon Web Services announced AWS Snowcone, a new small, ultra-portable, rugged, and secure edge computing and data transfer device. At under 5 lbs and able to fit in a …

cloud
How to implement least privilege in the cloud

According to a recent survey of 241 industry experts conducted by the Cloud Security Alliance (CSA), misconfiguration of cloud resources is a leading cause of data breaches. …

Amazon AppFlow
Amazon AppFlow automates bidirectional data flows between AWS and SaaS apps

Amazon AppFlow is a fully managed service that provides an easy, secure way for customers to create and automate bidirectional data flows between AWS and SaaS applications …

Don't miss

Cybersecurity news