Tips
Tips
-
How attackers can intercept iCloud Keychain data
A verification flaw in the synchronization service of iCloud Keychain enables attackers to intercept the data it transfers. Expert Frank Siemons explains what to do about it. Continue Reading
-
How Microsoft SRD uses AI to help developers with security
Microsoft SRD is a new cloud service that aims to detect vulnerabilities in software using artificial intelligence. Expert Dave Shackleford explains what that means. Continue Reading
-
Face the challenges of secure cloud access control
Don't store identity and access data in the cloud without first taking secure cloud access control seriously. Expert Rob Shapland explains the security considerations for enterprises. Continue Reading
-
A look at serverless applications and how to secure them
Serverless applications can be powerful tools, but they also require specific security tactics. Expert Ed Moyle explains how these applications work and how they can be secured. Continue Reading
-
Applying proper cloud access control to prevent data exposures
Several recent data exposures have involved misconfigured Amazon S3 buckets. Dave Shackleford discusses the importance of proper cloud access control and how to implement it. Continue Reading
-
How to keep an Amazon S3 bucket from becoming public
A public-facing Amazon S3 bucket caused problems for major organizations, including Booz Allen Hamilton. Expert Rob Shapland explains what happened and how to prevent it. Continue Reading
-
Zombie cloud infrastructures haunt enterprise security teams
Instances created, but then forgotten can cause zombie cloud infrastructures that threaten the security of enterprises. Expert Frank Siemons discusses how to handle these systems. Continue Reading
-
The security challenges of custom applications in the cloud
Securing custom applications in the cloud can be a hassle for enterprises. Expert Ed Moyle discusses how to make it easier to secure custom cloud apps. Continue Reading
-
Why the use of blockchain in the cloud is growing quickly
Blockchain cloud services may offer organizations the ability to shift away from traditional cryptography models. Expert Dave Shackleford discusses what options are available. Continue Reading
-
How to use a cloud-based sandbox to analyze malware
A cloud-based sandbox can be a helpful tool for enterprises looking to bolster their intrusion prevention systems. Expert Rob Shapland explains how to leverage this technology. Continue Reading
-
How NetFlow data can be used for cloud environments
Collecting and analyzing NetFlow data can help organizations detect security incidents and figure out their cause. Expert Frank Siemons explains how NetFlow works. Continue Reading
-
Continuous monitoring in the cloud: Two steps to make it a reality
Enterprises can achieve continuous monitoring in the cloud if they focus on the two main elements of it. Expert Dave Shackleford discusses what those elements are. Continue Reading
-
What a CPU cache exploit means for multi-tenant cloud security
Researchers recently proved that it's possible to steal cloud data from a CPU cache. Expert Rob Shapland discusses how this works and what it means for multi-tenant cloud security. Continue Reading
-
How to ensure a secure data transport of information in the cloud
A secure data transport of information stored in the cloud can be challenging. Expert Frank Siemons explains the options available to companies for securing physical data movement. Continue Reading
-
Is a malicious hypervisor a real security threat to enterprises?
It's possible for hackers to use a malicious hypervisor to access data on virtual machines. Expert Ed Moyle discusses how this works and the potential threat it poses. Continue Reading