Content Paint

cloud security

Reimagining cloud-native security for developers and platform owners

Even with ‘traditional’ configuration of resources in the cloud - and Kubernetes becomes a more extreme example of this – what is crystal clear is that security cannot stay outside of the development and DevOps teams."

Microsoft admits “insecure pattern” in Azure AD exposed customers to risk of data loss, account takeover

"The risk is mainly with multi-tenant applications where this misconfiguration could result [in] account and privilege escalation" -- here's what you need to do.

Cryptojacking: Low Risk for Them, High Cost for You

With harvested credentials some groups spun up additional resources until they exhausted the credit cards on file...

Novel cloud attack pivoted from K8s to Lambda, pulled IAM keys from Terraform

A recent attack tracked by researchers at cloud security company Sysdig saw the attackers use an exposed Kubernetes container to move laterally to the victim’s AWS account – gaining initial access by exploiting a public-facing service in a self-managed Kubernetes cluster hosted inside an AWS cloud account. The company'

Pentagon CIOs slapped over cloud security by auditors days before 3TB of emails exposed

Days before the exposure this week of over three terabytes of military emails owing to misconfigured Azure services, the US Department of Defense (DoD)’s Inspector General had warned Pentagon CIOs that their teams were not properly reviewing documentation designed to ensure military cloud security – and running systems with unmitigated

Oracle Cloud the latest to be exposed by Wiz for tenant isolation failure

Oracle fixed the vulnerability "extraordinarily quickly" in July, but it is unclear when it was introduced

Industry gets a year more to implement strict new UK telco security rules

Strong new requirements for cloud providers and network security on their way.

Fintech Solarisbank shakes up tech management with new CIO and CTO

The German bank is working to incorporate acquisition Contis' tech.

AWS Glue vulnerability let security researchers take over the cloud service

Rapidly fixed and not exploited, but hair-raising nonetheless.

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.