Sicurezza

Eliminating Excessive Permissions

Pubblicato il

Excessive permissions are the #1 threat to workloads hosted on the public cloud. As organizations migrate their computing resources to public cloud environments, they lose visibility and control over their assets. In order to accelerate the speed of business, extensive permissions are frequently granted to users who shouldn’t have them, which creates a major security […]

Sicurezza

Economics of Load Balancing When Transitioning to the Cloud

Pubblicato il

One of the concerns I hear often is that application delivery controller (ADC) licensing models do not support cloud transitions for the enterprise or address the business needs of cloud service providers that have a large number of tenants. Of course, there are many models to choose from – perpetual pricing per instance, bring-your-own license […]

Sicurezza

Managing Security Risks in the Cloud

Pubblicato il

Often, I find that only a handful of organizations have a complete understanding of where they stand in today’s threat landscape. That’s a problem. If your organization does not have the ability to identify its assets, threats, and vulnerabilities accurately, you’re going to have a bad time. A lack of visibility prevents both IT and […]

Sicurezza

Does your cloud-access security broker support IPv6? It should.

Pubblicato il

Cloud access security brokers (CASB) insert security between enterprises and their cloud services by providing visibility and access control, but IPv6 could be causing a dangerous blind spot. That’s because CASBs might not support IPv6, which could be in wide corporate use even in enterprises that choose IPv4 as their preferred protocol. [ Related: What […]

Sicurezza

Application Delivery Use Cases for Cloud and On-Premise Applications

Pubblicato il

Most of us use web applications in our daily lives, whether at work or for personal reasons. These applications include sites offering banking and financial services, payroll, utilities, online training, just to name a few. Users get frustrated, sometimes annoyed, if the applications – such as bank account access, loading of a statement, emails, or […]

Sicurezza

Anatomy of a Cloud-Native Data Breach

Pubblicato il

Migrating computing resources to cloud environments opens up new attack surfaces previously unknown in the world of premise-based data centers. As a result, cloud-native data breaches frequently have different characteristics and follow a different progression than physical data breaches. Here is a real-life example of a cloud-native data breach, how it evolved and how it […]

Sicurezza

Security Pros and Perils of Serverless Architecture

Pubblicato il

Serverless architectures are revolutionizing the way organizations procure and use enterprise technology. This cloud computing model can drive cost-efficiencies, increase agility and enable organizations to focus on the essential aspects of software development. While serverless architecture offers some security advantages, trusting that a cloud provider has security fully covered can be risky. That’s why it’s […]

Sicurezza

Are Your DevOps Your Biggest Security Risks?

Pubblicato il

We have all heard the horror tales: a negligent (or uniformed) developer inadvertently exposes AWS API keys online, only for hackers to find those keys, penetrate the account and cause massive damage. But how common, in practice, are these breaches? Are they a legitimate threat, or just an urban legend for sleep-deprived IT staff? And […]