article thumbnail

Q&A: Sophos poll shows how attackers are taking advantage of cloud migration to wreak havoc

The Last Watchdog

Cloud migration, obviously, is here to stay. Related: Threat actors add ‘human touch’ to hacks To be sure, enterprises continue to rely heavily on their legacy, on-premises datacenters. And now we have that same pattern playing out, once more, with cloud migration.

article thumbnail

The Impact of Remote Work and Cloud Migrations on Security Perimeters

Security Affairs

Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini ( SecurityAffairs – hacking, cybersecurity) Her specialties are in news, thought leadership, features, white papers, and PR writing, and she is an experienced editor for both print and online publications. She is also a regular writer at Bora.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSAC insights: Introducing ‘CWPP’ and ‘CSPM,’ new frameworks to secure cloud infrastructure

The Last Watchdog

In pulling off that milestone hack, Paige Thompson took advantage of CapOne’s lack of focus on cloud security as the banking giant rushed headlong into leveraging Amazon Web Services. A slew of new cloud-security frameworks have gained traction since the Capital One hack. Here are the key takeaways: Cloud migration risks.

article thumbnail

NEW TECH SNAPSHOT: The role of ‘MSSPs’ in helping businesses manage cybersecurity

The Last Watchdog

Criminal hacking collectives are thriving, more than ever. MSSPs have since broadened and advanced their services, a trend that continues as cloud migration gained momentum in the 2010s — and then accelerated with the onset of Covid 19. The new normal CISOs face today is something of a nightmare.

article thumbnail

It is Microsoft vs Dell and IBM after SolarWinds hack

CyberSecurity Insiders

In November 2020, Security firm FireEye revealed that a Russian intelligence funded hacking group had infiltrated the computer networks of several organizations and was indulging in several espionage related tactics since 2019. The post It is Microsoft vs Dell and IBM after SolarWinds hack appeared first on Cybersecurity Insiders.

Hacking 97
article thumbnail

Security Affairs newsletter Round 474 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

OpenAI’s Altman Sidesteps Questions About Governance, Johansson at UN AI Summit Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini ( SecurityAffairs – hacking, newsletter)

article thumbnail

MY TAKE: Why speedy innovation requires much improved cyber hygiene, cloud security

The Last Watchdog

Hacking collectives are already probing, if not exploiting, containers and APIs. One new detection technology is XDR , a new approach to detecting and responding to threats across hybrid cloud networks , with the aim of quickly — and with great accuracy — detecting malicious activity.