Skip to content
securitysifu

SecuritySifu

CyberSecurity And Emerging Technology
securitysifu
  • Home
  • Security
  • Artificial Intelligence
  • IoT
  • Blockchain
  • Cloud
  • Mobile
  • DarkNet
  • Feeds

Category: Cloud

You've Got Cloud Security All Wrong: Managing Identity in a Cloud World
Cloud Security

You’ve Got Cloud Security All Wrong: Managing Identity in a Cloud World

12/02/2021 No Comments accountassessmentattackauthenticationblockchainbotbusinesscloudcompliancecredentialsdatadetectiondigitaldrframeworkgovernancehttpsiamidentityinfrastructureinternetiotkeyleaknetwork

In a hybrid and multicloud world, identity is the new perimeter and a critical attack surface for bad actors. As organizations prioritize digital transformation, they…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More You’ve Got Cloud Security All Wrong: Managing Identity in a Cloud World
Cloud Security

2.3B Files Exposed In A Year: A New Record For Misconfigs

04/10/2020 No Comments amazonawsmisconfigurations3storage

The last 12 months have seen the exposure of a record 2.3 billion files across cloud databases and online shares, according to an analysis released…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More 2.3B Files Exposed In A Year: A New Record For Misconfigs
Cloud security is too important to leave to cloud providers
Cloud Security

Cloud security is too important to leave to cloud providers

30/09/2020 No Comments abuseapibreachcloudhijackiaminsider threatmisconfigurationthreat

As cloud rises to encompass to more corporate applications, data and processes, there’s potential for end-users to outsource their security to providers as well. The…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More Cloud security is too important to leave to cloud providers
New Allegations: Capital One Suspect Stole From 30+ Organizations
Cloud Security

Capital One Suspect Stole From 30+ Organizations

27/09/2020 No Comments amazonawsdata leak

The woman allegedly responsible for the massive breach of customer data at Capital One stole data from 30 other organizations, according to new information from…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More Capital One Suspect Stole From 30+ Organizations
Microsoft and Reliance Jio team up in 10-year cloud deal to ‘transform Indian economy and society’
Cloud

Microsoft and Reliance Jio team up in 10-year cloud deal to ‘transform Indian economy and society’

21/09/2020 No Comments azureindiamicrosoft

Indian network operator Reliance Jio has announced a 10-year partnership with Microsoft to utilize and promote Azure and ‘accelerate the digital transformation of the Indian…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More Microsoft and Reliance Jio team up in 10-year cloud deal to ‘transform Indian economy and society’
Top 10 IT trends of the last 20 years
Cloud Security

Top 10 IT trends of the last 20 years

14/09/2020 No Comments cloudsecuritytrend

Two decades ago some people still used dial-up modems, and now the world is at our fingertips. Read on to get a sense of how…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More Top 10 IT trends of the last 20 years
Are Your Employees Using Your Data in the Shadows?
Cloud Security

Are Your Employees Using Your Data in the Shadows?

10/07/2020 No Comments cloudcyberthreat

You have superstar employees who run your business like it’s their own. They use new apps to collaborate with coworkers, vendors, and customers to get…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More Are Your Employees Using Your Data in the Shadows?
Yes, there are security ramifications to serverless computing
Cloud

Yes, there are security ramifications to serverless computing

20/06/2020 No Comments serverless

At least one in five organizations, 21%, have implemented serverless computing as part of their cloud-based infrastructure. That’s the finding of a recent survey of…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More Yes, there are security ramifications to serverless computing
MongoDB Leak Exposed Millions of Medical Insurance Records
Cloud Security

MongoDB Leak Exposed Millions of Medical Insurance Records

13/06/2020 No Comments data leakdatabasemongodbnosqlpassword

Millions of records containing personal information and medical insurance data were exposed by a database belonging to insurance marketing website MedicareSupplement.com. An online database belonging…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More MongoDB Leak Exposed Millions of Medical Insurance Records
A guide to securing application consistency in multi-cloud environments
Cloud Security

A guide to securing application consistency in multi-cloud environments

24/03/2020 No Comments application securityhybrid cloudmulti cloud

Cloud computing. It is like a well-trodden path when it comes to talking about digitalization. Multi-cloud is another term that has crossed many lips, and…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More A guide to securing application consistency in multi-cloud environments

Posts navigation

Page 1 Page 2 Next page

RSS Feeds

  • What modern cybersecurity can learn from ancient adversaries
  • Key Cybersecurity Challenges for 2021
  • Oxfam Australia confirms 'supporter' data accessed in cyber attack
  • Cybercrime's Dark Triad
  • Globe rolls out network virtualisation platform, strengthens SD-WAN play
  • Risk Analytics Firm Qomplx to Go Public Via Casper CEO SPAC
  • Cyber security expert discusses potential for Oklahoma water hacks
  • Financial Regulators Eye Stricter Cybersecurity Incident Reporting Standards
  • Why Is IoT Security Important?
  • Inherently secure systems mitigate software supply chain attacks

Recent Vulnerabilities

Is Koo an Alternative to Twitter or a New Path for Cyber Criminals? – EC-Council Blog

03/03/2021 No Comments
What can you do about the 'unfixable' exploit affecting almost every iPhone and iPad?

What can you do about the ‘unfixable’ exploit affecting almost every iPhone and iPad?

03/10/2019 No Comments
Nearly 60% of businesses suffered a data breach in the past 3 years

Nearly 60% of businesses suffered a data breach in the past 3 years

03/10/2019 No Comments
Researchers Say They Uncovered Uzbekistan Hacking Operations Due To Spectacularly Bad OPSEC

Researchers Say They Uncovered Uzbekistan Hacking Operations Due To Spectacularly Bad OPSEC

04/10/2019 No Comments
APAC firms will need AI as speed increasingly critical in cyberdefence

APAC firms will need AI as speed increasingly critical in cyberdefence

07/10/2019 No Comments
No comments found.
0day 2fa 4g abuse access control account admin adware aerospace agile ai amazon analytics android anonymity anonymous antivirus api app apple application security appsec apt art artificial intelligence assessment atm attachment attack audit authentication automation autonomous vehicles autopilot aws azure backdoor backup bcp bgp big data biometric bitcoin block blockchain blue team bluekeep bluetooth bot botnet breach breached browser brute force bug bug bounty business business continuity business impact byod camera capsule network cars casino censor cert certificate china chipset chrome cia cio cisco ciso click fraud cloud cnc code code signing compliance container cookie corona covid-19 crack credential stuffing credentials credit card crime critical infrastructure crypto cryptocurrency cryptography cryptojacking cryptomining currency cve cvss cyber cyber attack cyber defense cyber espionage cyber insurance cyber resilience cyberattack cybercrime cybersecurity cyberthreat cyberwarfare cylance darknet darkweb data data breach data leak database ddos debug decryption deepfake deepweb defcon detection devops devsecops diabetes dictionary attack digital digital forensics digital signature disaster recovery diy dkim dmarc dns docker domain doos dos dr e-commerce ecommerce edge computing email emotet encryption encryption keys enigma equifax espionage eternalblue ethereum european union exif exploit extortion facebook facial recognition fake fbi fileless firefox firewall forensics framework fraud ftp fuzzing gdpr git github gmail goldbrute google governance gps grc hack hacked hacker hacktivism hacktivist hash hijack hipaa honeypot hosting hsm https huawei hybrid cloud iam ibm ics identity incident incident handling incident management incident response india industrial control system information security infrastructure injection insider threat instagram insurance intel intelligence internet ioc ios iot ip ipad iphone isms iso iso 27001 iso27000 isp jailbreak kasperksy Kaspersky key keylogger kgb kubernetes law lawsuit leak legal libra linux lock lte mac machine learning malvertising malware managed security medical devices meltdown mfa microprocessor microsoft military mimikatz mirai misconfiguration mitm mitre mobile mobile app mongodb monitor mozilla mssp multi cloud music nasa netcat network nfc nosql notepad notpetya nsa office open source openssl operating system owasp password patch payment pdf penetration test personal information pgp phishing phone php pii pin plugin policy ponzi porn power grid powershell privacy private keys privilege access program programmer protection proxy python quantum ransomware raspberry pi rat rce rdp red team remote code execution response risk router rsa russia s3 saas satellite scada scam script security security awareness self driving car server serverless sextortion sha shell side channel skim smart city smart device smart home smart tv smartphone sms sniff soc social engineering social media software spam spear phishing spectre spf spoof spy spyware sql sqlite ssh ssl standard startup steganography storage stuxnet supply chain surveillance tcp teamviewer telegram tesla testing threat tls token tor trend trojan unix usa usb video virus vmware voice voip vpn vulnerability waf wannacry web website whatsapp whitehat wi-fi wifi wikileaks windows wipro wireless wordpress worm xss yubikey zero day zero trust zoom

Recent Posts

  • Is Koo an Alternative to Twitter or a New Path for Cyber Criminals? – EC-Council Blog
  • Why 2021 Will Be The Year Of Adaptive Cybersecurity – Forbes
  • SolarWinds: How Russian spies hacked the Justice, State, Treasury, Energy and Commerce Departments – CBS News
  • Could this Utah proposal quash lawsuits from victims of data breaches? – Deseret News
  • As cyberattacks peak, so does the demand for Profero’s services – CTech

Trending

blockchain malware diabetes adware chrome hacked amazon gdpr personal information iam spear phishing spf smart city covid-19 mobile business continuity vmware password ibm identity
Follow Us

Search…

  • Home
  • Security
  • Artificial Intelligence
  • IoT
  • Blockchain
  • Cloud
  • Mobile
  • DarkNet
  • Feeds
SecuritySifu | © Copyright All right reserved
loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.