New & Notable
Cloud Computing Security Issues: Incident Response - Data Breach Prevention News
December 07, 2018
News roundup: A critical Kubernetes vulnerability was found in the system's API server and could have a wide reach. Plus, ESET found 21 new Linux malware families, and more.
June 12, 2018
Security researchers discovered an unsecured Kubernetes console leading to a Weight Watchers exposure, but, allegedly, no personal data was leaked as a result of the issue.
June 08, 2018
Amazon Web Services and Google Groups have seen data exposures due to poor configurations by users. Now, some have accidentally shared passwords on Trello boards.
July 28, 2017
In this week's Risk & Repeat podcast, SearchSecurity editors discuss the series of enterprise data leaks through misconfigured Amazon S3 buckets and what should be done about them.
Cloud Computing Security Issues: Incident Response - Data Breach Prevention Get Started
Bring yourself up to speed with our introductory content
Just as there's no one way to infiltrate the cloud, there's no singular way to protect it. Cloud computing security controls incorporate facilities, personnel, processes and more. Continue Reading
This practice quiz will assess your understanding of key concepts in Domain 2 of the CCSP exam. This part of the test covers cloud data security strategies, technologies and more. Continue Reading
Dive into Domain 1 of the CCSP cloud certification exam, a section of the test that covers architectural concepts and design principles of secure cloud computing. Continue Reading
Evaluate Cloud Computing Security Issues: Incident Response - Data Breach Prevention Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Remote access puts Docker APIs in a vulnerable position. Expert Dave Shackleford explains how hackers abuse Docker APIs to carry out cryptojacking attacks. Continue Reading
Wouldn't it be nice if every application were 100% cloud-ready? Unfortunately, that's often not the case, which can lead to security risks down the line if not properly addressed. Continue Reading
Cloud cryptomining as a service is a security risk to users. Expert Frank Siemons discusses cloud mining service providers and what to look out for if you use one. Continue Reading
Manage Cloud Computing Security Issues: Incident Response - Data Breach Prevention
Learn to apply best practices and optimize your operations.
After a security breach, incident response practices become crucial to minimize and contain the damage. Learn about incident response frameworks with guest David Geer. Continue Reading
Threat intelligence can facilitate cloud-based malware collection, which has value for enterprise cybersecurity. Expert Frank Siemons discusses collecting and analyzing malware. Continue Reading
Any organization that uses cloud services can learn something from the 2016 Uber data breach. Expert Ed Moyle explains the main takeaways from the massive breach. Continue Reading
Problem Solve Cloud Computing Security Issues: Incident Response - Data Breach Prevention Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
With an increase in ransomware attacks involving cities, the need to update incident response plans has become clear. Learn what organizations should do if infected with ransomware. Continue Reading
As the value of bitcoin has risen over the last year, so has the prevalence of cloud cryptojacking attacks. Expert Rob Shapland explains how enterprises can prevent these attacks. Continue Reading
SQL injection attacks threaten enterprise database security, but the use of cloud services can reduce the risk. Here's a look at some alternative SQL injection protection methods. Continue Reading