This has been the year of cybersecurity, or one of data breaches. Depending on where you stand. In any case, it’s been a busy year for the cybersecurity industry and for companies trying to lock down their cloud security strategies….
Tag: server configuration
Securing Your AWS IAM Cross-Account Roles and Service Roles
AWS Identity and Access Management (IAM) is a powerful service that helps you control access to AWS resources by enabling you to specify who and what is authenticated (signed in) and authorized (has permissions) to use those resources. Since IAM…
How to Discover Your S3 Bucket Exposures
For many, enterprises Amazon S3 buckets have been revolutionary, especially for those storing and distributing massive amounts of videos and photos. S3, or Simple Storage Service, is public cloud storage within Amazon Web Services (AWS). In a nutshell, they provide…
Halo Cloud Secure: A unified product
Vitaliy Geraymovych, Talli Somekh, and I founded CloudPassage in 2010. In those early days, cloud infrastructure was broadly dismissed as little more than a hosting environment for games, blogs, and experiments. The bulk of IaaS offers revolved around cloud servers…
Automated, unified visibility and evaluation for security – yes it’s possible
When it comes to enterprise security, the needs are growing faster than universities can produce graduates with the relevant diplomas. It can be challenging to break down an organization’s list of security controls into something manageable, let alone doable. Accomplishing…
Changes in the CIS controls and why you need to know
Have you heard of the top 20 Controls from the Center for Internet Security (CIS)? These are also known as the CIS common controls and they’re my favorite list of controls. Sure, PCI, NIST, CSA, SOX, FERPA, NERC, and HIPAA…
LIDS cross site scripting (XSS) for attack detection
Cross Site Scripting (XSS) is one of the most common application security vulnerabilities and it affects many web applications. XSS attacks occur when an attacker uses a web application to send malicious code (generally in the form of a browser…
Who’s responsible for security in AWS?
One of the biggest questions to be answered as enterprises migrate to AWS is, who’s responsible for security? The AWS shared responsibility model for security is a must-read for security and compliance practitioners starting their AWS journey. AWS does provide…
Do you know the most common software and application misconfiguration mistakes?
If you look back at this year’s hacks, (and the year before and the year before that) many of them come from three areas: improperly configured servers, applications, and vulnerable software. Most organizations are aware of these configuration problems but…
Webinar: Part 2 – Verify, don’t trust: Best practices for reducing vulnerability exposure in Docker environments
Earlier this month we shared with you part one of our webinar series with Holger Schulze: Verify, don’t trust: What you need to know about popular Docker Hub images. Now it’s time for the release of part two: Verify, don’t…