article thumbnail

Q&A: Sophos poll shows how attackers are taking advantage of cloud migration to wreak havoc

The Last Watchdog

Cloud migration, obviously, is here to stay. But there’s no doubt that the exodus to a much greater dependency on hybrid cloud and multi-cloud resources – Infrastructure-as-a-Service ( IaaS ) and Platforms-as-a-Service ( PaaS ) – is in full swing. LW: Shifting gears a bit, what’s going on with ransomware?

article thumbnail

Defenders Be Prepared: Cyberattacks Surge Against Linux Amid Cloud Migration

Dark Reading

Ransomware in particular poses a major threat, but security vendors say there has been an increase in Linux-targeted cryptojacking, malware, and vulnerability exploits as well, and defenders need to be ready.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSAC insights: ‘SaaS security posture management’ — SSPM — has emerged as a networking must-have

The Last Watchdog

To accelerate cloud migration, AWS, Microsoft Azure and Google Cloud guaranteed that the hosted IT infrastructure they sought to rent to enterprises would be security-hardened – at least on their end. Wave after wave of successful exploits took full advantage of the misconfigurations spinning out of cloud migration.

article thumbnail

Fifteen Best Practices to Navigate the Data Sovereignty Waters

Thales Cloud Protection & Licensing

Understand the Nature of Data in Cloud Migration As noted, to meet data sovereignty requirements, organizations will often have to set up cloud data centers in multiple jurisdictions and, as such, carry out cloud migration.

article thumbnail

Fifteen Best Practices to Navigate the Data Sovereignty Waters

Security Boulevard

Understand the Nature of Data in Cloud Migration As noted, to meet data sovereignty requirements, organizations will often have to set up cloud data centers in multiple jurisdictions and, as such, carry out cloud migration.

article thumbnail

MY TAKE: A few reasons to believe RSAC 2023’s ‘stronger together’ theme is gaining traction

The Last Watchdog

The trick in today’s operating environment is how to do this well with cloud migration accelerating. It’s easier than ever for malicious hackers to get deep access, steal data, spread ransomware, disrupt infrastructure and attain long run unauthorized access.

Mobile 238
article thumbnail

MY TAKE: Why speedy innovation requires much improved cyber hygiene, cloud security

The Last Watchdog

One new detection technology is XDR , a new approach to detecting and responding to threats across hybrid cloud networks , with the aim of quickly — and with great accuracy — detecting malicious activity. These new technologies are incredibly complex, often poorly documented, and change constantly. •A