21% of all files in the cloud contain sensitive data

McAfee released its Cloud Adoption and Risk Report, which analyzed billions of events in anonymized customers production cloud use to assess the current state of cloud deployments and to uncover risks. The report revealed that nearly a quarter of the data in the cloud can be categorized as sensitive, putting an organization at risk if…

Organizations feel ready to put highly sensitive data in the cloud

Many corporate employees are ready to store highly sensitive data in the cloud. However, many are still skeptical of the security posture of their own organizations, according to an Armor poll that fielded responses from 37,000 Twitter users over a 13-week period. Additional key findings show that reducing the cost of managing security, maintaining compliance,…

Enhancing cloud security for AWS deployments

So many organizations are migrating their entire IT infrastructure to the cloud and adopting a “cloud first” approach. With this approach, organizations cut down on overall IT business costs, while increasing scalability, modernizing their IT infrastructure and enabling collaboration among development teams to help solve complex challenges. The most popular cloud computing platform on the…

It Takes an Average 38 Days to Patch a Vulnerability

It takes over a month for the average organization to patch its most critical vulnerabilities, according to a new report detecting trends in Web application attacks. The data comes from tCell, which today released its Q2 2018 “Security Report for In-Production Web Applications.” Researchers analyzed more than 316 million security incidents across its customer base…

Arista partners with VMware and Zscaler for hybrid cloud security

Arista Networks announced security capabilities focused on private, hybrid and public cloud networking. Based on Arista’s cloud-grade EOS and CloudVision software, Arista’s approach redefines silo security into holistic security designed for a multi-cloud environment. Key integration includes VMware NSX Data Center and Zscaler for holistic security. The new security expansion delivers three attributes: network segmentation,…

Hackers Leverage AWS To Breach, Persist In Corporate Networks

A new body of evidence indicates threat actors are using increasingly advanced techniques to target cloud providers and leveraging cloud-specific traits to hide their activity as they breach and persist in target networks. Data comes from the Threat Stack security team, which spotted the pattern over multiple years of observing behavior on client networks. It…

Cloud computing remains top emerging business risk

Cloud computing ranks as the top risk concern for executives in risk, audit, finance and compliance, according to the latest survey by Gartner. In Gartner’s latest quarterly Emerging Risks Report, 110 senior executives in risk, audit, finance and compliance at large global organizations identified cloud computing as the top concern for the second consecutive quarter….

5 Tips for Integrating Security Best Practices into Your Cloud Strategy

Do ‘cloud-first’ strategies create a security-second mindset? Too often, I hear system administrators tell me that their organization’s cloud-first strategy is jeopardizing security. With each new software-, infrastructure, and platform-as-a-service adopted by line-of-business users or within enterprise IT, security seems to be an afterthought. The challenge with most cloud-first strategies is that they incorporate both…