Best Practices for Securing Amazon EC2

As enterprises move applications from traditional data centers to a public or hybrid cloud , their legacy security model also needs to change to support the new environment. For example, in the Amazon Web Services (AWS) environment, AWS is responsible…

Read More

Friends Don’t Let Friends’ Servers Get Exploited

Brian Krebs reported yesterday on a service that he’s been researching that is selling access to exploited Microsoft Windows servers. Krebs says that the service is renting access to nearly 17,000 computers worldwide, although almost 300,000 compromised systems have passed…

Read More