Sicurezza

Are Your DevOps Your Biggest Security Risks?

Pubblicato il

We have all heard the horror tales: a negligent (or uniformed) developer inadvertently exposes AWS API keys online, only for hackers to find those keys, penetrate the account and cause massive damage. But how common, in practice, are these breaches? Are they a legitimate threat, or just an urban legend for sleep-deprived IT staff? And […]

Sicurezza

Keeping Pace in the Race for Flexibility

Pubblicato il

Flexibility and elasticity. Both rank high on the corporate agenda in the age of digital transformation and IT is no exception. From the perspective of IT, virtualization and cloud computing have become the de facto standard for deployment models. They provide the infrastructure elasticity to make business more agile and higher performing and are the reason why the […]

Sicurezza

Mitigating Cloud Attacks With Configuration Hardening

Pubblicato il

For attackers, misconfigurations in the public cloud can be exploited for a number of reasons. Typical attack scenarios include several kill chain steps, such as reconnaissance, lateral movement, privilege escalation, data acquisition, persistence and data exfiltration. These steps might be fully or partially utilized by an attacker over dozens of days until the ultimate objective is achieved and the […]

Sicurezza

Excessive Permissions are Your #1 Cloud Threat

Pubblicato il

Migrating workloads to public cloud environment opens up organizations to a slate of new, cloud-native attack vectors which did not exist in the world of premise-based data centers. In this new environment, workload security is defined by which users have access to your cloud environment, and what permissions they have. As a result, protecting against […]

ICT

TomTom con Microsoft: localizzazione e cloud

Pubblicato il

Si rafforza la partnership fra TomTom e Microsoft che riguarda l’impiego dell’infrastruttura cloud di Azure e i servizi di localizzazione. The post TomTom con Microsoft: localizzazione e cloud appeared first on Punto Informatico.

Sicurezza

Ensuring Data Privacy in Public Clouds

Pubblicato il

Most enterprises spread data and applications across multiple cloud providers, typically referred to as a multicloud approach. While it is in the best interest of public cloud providers to offer network security as part of their service offerings, every public cloud provider utilizes different hardware and software security policies, methods and mechanisms, creating a challenge for the enterprise to maintain the […]