Tag: Cloud Security

The Data Security Landscape Is Shifting: Is Your Company Prepared?

The world around online data is changing, and with it the landscape of business is facing an irreversible shift. Not only in terms of regulations but in the way businesses actually use and have access to data. An increasing number of businesses are moving their data to the cloud, which brings a different set of security issues.

Through the cloud, hackers can shut down your business for weeks — or longer. They can steal not only your data but your resources. Companies often don’t take this threat seriously enough. Thankfully, there are steps you can take to protect your company, and they aren’t that complicated.

Read about five best practices to keep your data (and profits) out of the hands of hackers on DarkReading.

8 Attack Vectors Puncturing Cloud Environments

As companies work to protect their cloud environments, they need to know which types of attacks are most likely to hit. “Cloud has been around for years, but cloud security has only within the past year or so become a formal discipline,” says Matthew Chiodi, vice president of cloud security at RedLock. And as the cloud evolves, attackers are finding new, advanced ways to break into enterprise environments.

Public cloud security incidents often stem from a poor understanding of the shared responsibility model, which governs how cloud users and providers both shoulder the burden of security, Chiodi says.

Read about different types of cyberattacks that are affecting cloud environments on DarkReading.

What are next generation firewalls? How the cloud and complexity affect them

Traditional firewalls track the domains that traffic is coming from and the ports it’s going to. Nextgen firewalls go beyond that — they also monitor the content of the messages for malware and data exfiltration and can react in real time to stop threats. The newest iterations do even more, adding behavioral analytics, application security, zero-day malware detection, support for cloud and hybrid environments, and even endpoint protection.

According to Gartner, by 2020, nextgen firewalls will reach almost 100 percent of internet points of presence. Most organizations, however, will use only one or two of the nextgen features.

Read more about the future of next generation firewalls on CSO.

IoT failures plague most users worldwide

52% of consumers worldwide are now using Internet of Things (IoT) devices, yet 64% of those have already encountered performance issues – according to Dynatrace. On average, consumers experience 1.5 digital performance problems every day, and 62% of people fear the number of problems they encounter, and the frequency, will increase due to the rise of IoT.

For organizations deploying IoT strategies, these results indicate a critical need to master two things. Firstly, escalating IT complexity, thanks to new cloud technologies, microservices and the pressure to innovate faster. Secondly, the necessity to build out well-planned IoT monitoring and performance strategies to ensure sound application delivery and a great digital experience.

Read more about the findings of the Dynatrace report on Help Net Security.

It Takes an Average 38 Days to Patch a Vulnerability

It takes over a month for the average organization to patch its most critical vulnerabilities, according to a new report detecting trends in Web application attacks.

The data comes from tCell, which today released its Q2 2018 “Security Report for In-Production Web Applications.” Researchers analyzed more than 316 million security incidents across its customer base and published key findings on the most common types of real-world attacks taking place within in-production Web apps in the Amazon Web Services and Microsoft Azure cloud ecosystems.

Read more about the findings of the new report by tCell on DarkReading.

Hackers Leverage AWS To Breach, Persist In Corporate Networks

A new body of evidence indicates threat actors are using increasingly advanced techniques to target cloud providers and leveraging cloud-specific traits to hide their activity as they breach and persist in target networks.

Data comes from the Threat Stack security team, which spotted the pattern over multiple years of observing behavior on client networks. It was in 2016 when they noticed attacks leveraging Amazon Web Services (AWS) were becoming more sophisticated. The trend picked up in 2017.

Read more about how attackers are abusing the characteristics of cloud services to launch and hide their activity as they traverse target networks, on DarkReading.

AWS S3 Bucket Exposed Containing GoDaddy Server Configuration and Pricing Models

Another week, another publicly accessible AWS storage cloud found to be leaking enterprise secrets. This time around, the company exposed was GoDaddy – but in a twist on the normal storyline, it was an AWS employee responsible for the misconfiguration.

Researchers with the UpGuard Cyber Risk Team found a publicly accessible Amazon S3 bucket wide open for public consumption. Included within that data store were documents that detailed configurations and pricing information for tens of thousands of systems in the AWS cloud.

Read more about the GoDaddy data leak on DarkReading.

The benefits of mature cloud security strategies

Organizations that take a pragmatic approach to securing the use of user- and business-unit-led-cloud services realize appreciable business benefits compared with organizations that take more draconian, coarse-grained approaches. According to a report conducted by the Enterprise Strategy Group, only 21% of organizations have adopted this kind of pragmatic approach.

Organizations are at different stages of their journey with respect to the maturity of their approach to cloud security, both in terms of their strategic approach to the cloud as well as tactical measures.

Read more about the findings of the new report by the Enterprise Strategy Group on Help Net Security.

5 Tips for Integrating Security Best Practices into Your Cloud Strategy

Robert Corradini, Director of Product Management at 5nine, often hears system administrators tell him that their organization’s cloud-first strategy is jeopardizing security. With each new software-, infrastructure, and platform-as-a-service adopted by line-of-business users or within enterprise IT, security seems to be an afterthought.

The challenge with most cloud-first strategies is that they incorporate both hybrid cloud (private and public) and multicloud (heterogeneous cloud infrastructures from multiple vendors) environments; in almost all cases, these infrastructures lack consistency in management interfaces, access controls, and third-party tool support. So, not only do cloud-first strategies increase your organization’s attack surface, they can be difficult to manage and secure.

Read Robert Corradini’s list of best practices that organizations can implement to ensure their cloud-first strategy is optimized for security on DarkReading.

Exposed Container Orchestration Systems Putting Many Orgs at Risk

New research confirms that many organizations are deploying workloads to the public cloud without adequate security controls and processes in place first. Lacework recently used the Shodan search engine, SSL data mining techniques, and some internally developed tools to uncover as many as 22,672 open container orchestration dashboards and API management systems on the Internet.

Some 95% of the exposed dashboards and management systems were hosted inside of Amazon Web Services. Though a vast majority of the open container orchestration interfaces had credentials for controlling access, the fact that they were exposed to the Internet at all is troublesome, says Dan Hubbard, chief security at Lacework.

Read more about the findings of the Lacework research into exposed container orchestration systems on DarkReading.