Search Results for: cloud Blog Post Moving Your Business to the Cloud? Cybercriminals are Hot on Your Heels October 13, 2021 Although cloud adoption has been an inevitable imperative for some time and a driving force in changing how businesses operate,... Blog Post Understanding shared responsibility models in the cloud July 16, 2021 We are becoming increasingly dependent on cloud services for specialized technology solutions as well as to facilitate day-to-day operations in... Blog Post SolarWinds Attacker Targets Cloud Service Providers in New Supply Chain Threat December 9, 2021 Earlier this year, a supply chain attack targeted at Solarwinds customers rocked the cybersecurity industry, implicating big tech as well... Blog Post Here are The Top Cybersecurity Risks in Cloud Computing March 10, 2021 In the past few years, the demand for cloud computing has increased dramatically. However, the transition to the cloud has... Blog Post Swiss Army Bans WhatsApp Amid Security Concerns February 3, 2022 The Swiss army has banned its personnel from using WhatsApp, Telegram, and Signal. The ban also extended to other foreign... Blog Post CISA Director: Attackers Targeted Port of Houston October 19, 2021 According to a joint security alert issued by the Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and the Coast... Blog Post 46% of Databases Globally are Not Secure – and You Could be One of Them October 12, 2021 If there is one piece of advice that all cybersecurity experts agree on, it is this: patch and update your... Blog Post Microsoft Issued a Warning to Its Azure Customers of a Flaw That Might Allow Hackers to Access Data September 23, 2021 On September 8, 2021, Microsoft issued a warning to its Azure customers) cloud computing customers) of a vulnerability. In essence,... Blog Post The Secure Access Service Edge (SASE) Security Model July 2, 2021 As we shift further towards remote working environments, it’s becoming clear that we’ve passed the point of no return. We... Blog Post MFA Best Practices for People and Business to Interact Securely Online May 20, 2021 According to a Gartner report, end-user spending on public cloud services topped $257.5 billion in 2020. This figure is forecast... Blog Post Latest Credential Data Breaches and What to Do to Not Get Compromised? May 25, 2021 According to Verizon’s 2021 Data Breach Investigation Report, the median data breach costs companies over $21,000 with some numbering in... Blog Post A Flaw in VMware Cloud June 17, 2020 Penetration testers at Citadel discovered a new vulnerability in VMware’s Cloud Directory platform on April 9. They discovered during auditing... Blog Post Phishing for Office 365 logins using Google Cloud Services August 5, 2020 Fraudsters are constantly looking for new ways of collecting login details. Malicious individuals have increasingly turned to public cloud services... Blog Post Zero-days in Accellion file transfer app used for data theft March 4, 2021 Back in December 2020, a software vendor Accellion informed about an actively exploited zero-day vulnerability in its File Transfer Appliance... Blog Post Dark Web Marketplaces Looking to Dupe Buyers with Illicit COVID-19 Vaccines April 8, 2021 Recently, there has been a surge of activity regarding supposed COVID-19 vaccine sales on dark web marketplaces (DWMs). Fake COVID-19...
Blog Post Moving Your Business to the Cloud? Cybercriminals are Hot on Your Heels October 13, 2021 Although cloud adoption has been an inevitable imperative for some time and a driving force in changing how businesses operate,...
Blog Post Understanding shared responsibility models in the cloud July 16, 2021 We are becoming increasingly dependent on cloud services for specialized technology solutions as well as to facilitate day-to-day operations in...
Blog Post SolarWinds Attacker Targets Cloud Service Providers in New Supply Chain Threat December 9, 2021 Earlier this year, a supply chain attack targeted at Solarwinds customers rocked the cybersecurity industry, implicating big tech as well...
Blog Post Here are The Top Cybersecurity Risks in Cloud Computing March 10, 2021 In the past few years, the demand for cloud computing has increased dramatically. However, the transition to the cloud has...
Blog Post Swiss Army Bans WhatsApp Amid Security Concerns February 3, 2022 The Swiss army has banned its personnel from using WhatsApp, Telegram, and Signal. The ban also extended to other foreign...
Blog Post CISA Director: Attackers Targeted Port of Houston October 19, 2021 According to a joint security alert issued by the Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and the Coast...
Blog Post 46% of Databases Globally are Not Secure – and You Could be One of Them October 12, 2021 If there is one piece of advice that all cybersecurity experts agree on, it is this: patch and update your...
Blog Post Microsoft Issued a Warning to Its Azure Customers of a Flaw That Might Allow Hackers to Access Data September 23, 2021 On September 8, 2021, Microsoft issued a warning to its Azure customers) cloud computing customers) of a vulnerability. In essence,...
Blog Post The Secure Access Service Edge (SASE) Security Model July 2, 2021 As we shift further towards remote working environments, it’s becoming clear that we’ve passed the point of no return. We...
Blog Post MFA Best Practices for People and Business to Interact Securely Online May 20, 2021 According to a Gartner report, end-user spending on public cloud services topped $257.5 billion in 2020. This figure is forecast...
Blog Post Latest Credential Data Breaches and What to Do to Not Get Compromised? May 25, 2021 According to Verizon’s 2021 Data Breach Investigation Report, the median data breach costs companies over $21,000 with some numbering in...
Blog Post A Flaw in VMware Cloud June 17, 2020 Penetration testers at Citadel discovered a new vulnerability in VMware’s Cloud Directory platform on April 9. They discovered during auditing...
Blog Post Phishing for Office 365 logins using Google Cloud Services August 5, 2020 Fraudsters are constantly looking for new ways of collecting login details. Malicious individuals have increasingly turned to public cloud services...
Blog Post Zero-days in Accellion file transfer app used for data theft March 4, 2021 Back in December 2020, a software vendor Accellion informed about an actively exploited zero-day vulnerability in its File Transfer Appliance...
Blog Post Dark Web Marketplaces Looking to Dupe Buyers with Illicit COVID-19 Vaccines April 8, 2021 Recently, there has been a surge of activity regarding supposed COVID-19 vaccine sales on dark web marketplaces (DWMs). Fake COVID-19...