Hackers Use Cloud Monitoring Tool to Install Cryptominers

Data Breach Today

Reports: TeamTNT Using Weave Scope Tool to Target Cloud Platforms TeamTNT, a recently uncovered hacking group, is weaponizing Weave Scope, a legitimate cloud monitoring tool, to help install cryptominers in cloud environments, according to reports from Intezer and Microsoft

Cloud 226

Start your cloud journey at Cloud Summit

OpenText Information Management

Did you know that this year, 83% of enterprise workloads will run in the cloud? News & Events Cloud & Applications OpenText Cloud Cloud Summit information matters cloud event cloud assessment free event cloud readiness

Cloud 79

Cloud Hopper: Major Cloud Services Victims Named

Data Breach Today

Reuters Says Fujitsu, Tata, NTT Data, Dimension Data, CSC and DXC Affected Six major cloud services providers apparently were victims of Cloud Hopper, an umbrella name for deep cyber intrusions suspected to originate in China, Reuters reports. The report also alleges Cloud Hopper-affected companies withheld information from their clients for reasons of liability and bad publicity

Cloud 193

What is cloud content management?

OpenText Information Management

They required extra labor, … The post What is cloud content management? Cloud Content Services cloud ECM Forrester Extended ECM content services CS-xECM-CE Cloud architecture cloud content management

Cloud 59

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

Migration to cloud content management now vital

OpenText Information Management

While modernizing cloud content management is a critical step in this transformation, new Forrester research reveals that most content today is still stored on-premises. Technologies Information Management Cloud cloud Forrester Research

Cloud 82

Even Ethical Hackers Abuse Cloud Services

Data Breach Today

Creating Cloud-Hosted Attack Infrastructures a Common Practice, Academic Researchers Find Many ethical hackers and other security professionals, such as penetration testers, have weaponized cloud platforms to host online attack infrastructure or have used the platforms to conduct reconnaissance, according security researchers at Texas Tech University

Cloud 178

How to Address Telehealth Cloud Security Risks

Data Breach Today

With the surge in telehealth use during the COVID-19 pandemic, healthcare organizations must be prepared to deal with cloud security and privacy risks, says Jim Angle of Trinity Health, who is the author of a recent report from the Cloud Security Alliance

Risk 145

5 key things to consider when migrating to the cloud

OpenText Information Management

Cloud computing is now touching all aspects of information technology, and document and data archiving is no exception. When it comes to security, cost savings, reliable services and scalability, there is no bigger advantage than storing your most valuable assets in the cloud.

Cloud 105

Cloud IAM: Integration Issues

Data Breach Today

A major misconception about cloud IAM is that it's easy to implement, says Mark Perry, CTO for APAC at Ping Identity. Implementation poses challenges, and cloud IAM must be carefully integrated with other systems, he says

Cloud 147

The Evolution of Cloud Governance

Data Breach Today

Expanse CTO Matt Kraning on Meeting New Demands for Cloud Security The good news is: Organizations are embracing the cloud, and that's a boon to velocity and digital transformation. Matt Kraning, CTO and co-founder of Expanse, discusses this challenge and how to improve cloud governance The bad news: Visibility and governance take a huge hit.

Protecting the Cloud Through Automation

Data Breach Today

Roger Hellman of BMC Software Discusses Cloud Automation and Remediation Automation is becoming a powerful tool in cloud security. Roger Hellman of BMC Software discusses specific areas where automation has been beneficial

Cloud 139

Cloud Leak Exposes 320M Dating-Site Records


Breach Cloud Security InfoSec Insider Privacy Web Security adult dating sites cloud server data leak Elasticsearch exposure mailfire meow attack misconfiguration personal information records romantic preferences vpnMentor

Cloud 92

Building Security Into Cloud Migration

Data Breach Today

Microsoft's Terence Gomes on Cloud Security and Some Misconceptions It's essential that security be built into cloud migrations and not handled as an afterthought, says Terence Gomes of Microsoft

Cloud 139

Cloud Security: Overcoming Roadblocks

Data Breach Today

While secure coding has always been an imperative, in a cloud-based environment, BMC Software's Rick Bosworth says it is especially critical since the liability does not rest with cloud services providers for secure configuration

Cloud 107

Migrating content, data and operations to the cloud

OpenText Information Management

Forrester research shows that organizations with cloud-based content management see substantial benefits over their on-premises peers in everything from usability to security to customer satisfaction. New work models are creating additional challenges for enterprises.

Cloud 62

Breach at Cloud Solution Provider PCM Inc.

Krebs on Security

based cloud solution provider, allowed hackers to access email and file sharing systems for some of the company’s clients, KrebsOnSecurity has learned. Those sources say the attackers stole administrative credentials that PCM uses to manage client accounts within Office 365 , a cloud-based file and email sharing service run by Microsoft Corp. Data Breaches Cloud Hopper gift card fraud Insight Enterprises microsoft Office365 PCM Inc. A digital intrusion at PCM Inc. ,

Cloud 171

Phishers are Angling for Your Cloud Providers

Krebs on Security

Many companies are now outsourcing their marketing efforts to cloud-based Customer Relationship Management (CRM) providers. United Rentals would not name the third party marketing firm thought to be involved, but passive DNS lookups on the UR subdomain referenced in the phishing email (used by UL for marketing since 2014 and visible in the screenshot above as “wVw.unitedrentals.com”) points to Pardot , an email marketing division of cloud CRM giant Salesforce.

Cloud 160

Next Cloud Security Challenge: Containers and Kubernetes

Data Breach Today

Agile Development Calls for New Ways to Secure Cloud Services The increasing use of containers and orchestration tools, such as Kubernetes, are driving demand for new cloud security and application deployment processes, according to research from the according to research from the Cloud Security Alliance presented Monday at the RSA 2020 conference

Cloud 147

The Future of Cloud Security

Data Breach Today

Forcepoint's Homayun Yaqub Previews New Virtual Roundtable Series What are some best practices for moving network security from the datacenter to the cloud? And what are the essentials of Secure Access Service Edge frameworks, and how can they be implemented? These are among the questions to be discussed in a new series of virtual roundtables hosted by Forcepoint and Homayun Yaqub

Cloud 123

AWS Cryptojacking Worm Spreads Through the Cloud


Cloud Security Malware Amazon Web Services AWS cado security credential harvesting cryptojacking cryptomining Monero teamtnt WormThe malware harvests AWS credentials and installs Monero cryptominers.

Cloud 105

Cloud Protection: How to Secure Server Environments

Data Breach Today

Jake King of Cmd Charts the Evolution of Cloud Workload Protection Platforms Development teams are increasingly building and deploying for the cloud, but DevOps practices too often fail to account for what happens after applications go from development into production and maintenance - and the ongoing security challenges they will face, says Jake King, CEO, of Cmd

Cloud 153

The Remote Workforce: Cloud Security Challenges

Data Breach Today

CISO of International Law Firm on Making the Right Moves As a result of the rapid move to a remote workforce, now is a golden opportunity to refine cybersecurity approaches - especially for the cloud, says Christian Toon, CISO at the international law firm, Pinsent Masons

Cloud 136

Assessing the Human Element in Cloud Access

Data Breach Today

Markku Rossi Discusses Shifting to Zero Standing Privileges Cloud security demands robust access management. Markku Rossi of SSH Communications Security discusses zero standing privileges and cloud access

Access 120

How Telework Is Changing Cloud Security

Data Breach Today

Jim Reavis of the Cloud Security Alliance on Adjusting CISOs' Priorities Because the COVID-19 pandemic had led to more employees working from home, cloud services have become indispensable, but the pressure is on organizations to ensure security, says Jim Reavis, CEO of the Cloud Security Alliance

Cloud 122

Cloud Security: Beyond CASB

Data Breach Today

Oracle's Amit Zavery on Taking a Comprehensive Approach Cloud access security brokers are not a panacea for all cloud security problems, says Oracle's Amit Zavery, who advocates an end-to-end approach

Cloud 130

Cloud Security Alliance, ISACA Announce Strategic Partnership to Reinvent Cloud Auditing and Assurance via ISACA Press Release

IG Guru

Organizations to collaborate on joint venture to bring the Certificate of Cloud Auditing Knowledge (CCAK) to the market via ISACA. The post Cloud Security Alliance, ISACA Announce Strategic Partnership to Reinvent Cloud Auditing and Assurance via ISACA Press Release appeared first on IG GURU.

Cloud 56

Going ‘cloud first’? Start with an easy win: Cloud fax

OpenText Information Management

Have you adopted a ‘cloud first’ strategy where you look to the cloud before an on-premises alternative? There are many benefits to transitioning your applications to a cloud service provider. There are even more when … The post Going ‘cloud first’?

Cloud 60

Announcing OpenText Content Services Cloud Editions (CE) 20.2

OpenText Information Management

OpenText Cloud Editions … The post Announcing OpenText Content Services Cloud Editions (CE) 20.2 release CE Cloud & Applications

Why The Cloud Is The New Network

Data Breach Today

Fleming Shi of Barracuda Networks on Latest Cloud Security Research Findings Barracuda Networks has released the findings of its latest survey on public cloud security. Fleming Shi, the company's chief technology officer, describes what is holding organizations back from fully embracing the public cloud

Cloud 126

Setting IAM Priorities in the Shift to the Cloud

Data Breach Today

Consultant James Gosnold on Avoiding Shortcuts As more organizations rely more heavily on cloud-based applications as a result of a remote workforce, they must avoid taking identity and access management shortcuts, says James Gosnold of the cloud consultancy CloudKubed, who calls for the addition of another layer of authentication.

Cloud 156

Top 2020 trends in cloud adoption

OpenText Information Management

Over the last decade, cloud has changed the way nearly every business and organization works. In that time, spending on public cloud increased from $77 billion to over $400 billion, and we have seen the rise of Google, Microsoft and Amazon as major players in the public cloud market.

Cloud 71

Architectural considerations when moving to the cloud

OpenText Information Management

Everyone is talking about moving to the cloud – cost savings, higher reliability, flexible performance options, speedier deployments. Many customers are still agonizing over the decision to move to the cloud out of concern for the safety and security of their data. … The post Architectural considerations when moving to the cloud appeared first on OpenText Blogs.

Cloud 51

Security at the Speed of the Cloud

Data Breach Today

McKinsey CISO Dan Fitzgerald on DevSecOps and the Future of Cloud Security Migrating from on-premises data security to the cloud and then embedding security in the application development process are common challenges for enterprises. Dan Fitzgerald, a CISO at the consultancy McKinsey & Co., shares insights on how to make these transitions

Cloud 174

Microsoft Warns on OAuth Attacks Against Cloud App Users


feature common to cloud services are on the rise. Cloud Security Hacks Web Security application-based attacks Attacks Cloud Services coronavirus COVID-19 log in with facebook log in with google Microsoft oauth Pandemic passwordless remote working warning work from home

Cloud 106

Integrating Data in the Cloud For Better Care

Perficient Data & Analytics

The following is the thirteenth blog in a series about why businesses are moving to the cloud to modernize and improve business performance. Now we want to discuss how the cloud can help businesses in their specific circumstances by looking at different industries.

Cloud 80

Skimming Campaign Leveraged Heroku Cloud Platform: Report

Data Breach Today

Malwarebytes: Platform Used to Host Card Skimmer Infrastructure, Payment Data Several e-commerce sites were targeted with a card skimming campaign that used the Salesforce-owned Heroku cloud platform to host skimmer infrastructure and stolen credit card data, according to a new report from the security firm Malwarebytes.

Cloud 161

Verizon: Breaches Targeting Cloud-Based Data Doubled in 2019

Data Breach Today

Analysts Predict Attacks in the Cloud Will Continue to Surge This Year Attacks targeting cloud-based data nearly doubled in 2019 as companies shifted more of their valuable information off-premises and misconfigurations and other issues made it more vulnerable, according to the 2020 Verizon Data Breach Investigations Report.

Cloud 150

Own Your Cloud Security

Thales eSecurity

As part of their digital transformation process, more and more businesses are moving to the cloud. Many companies think that by moving your data to the cloud, the service provider will be responsible for the security of your data. The hard truth is that most breaches in cloud computing environments are related to data or applications “living” in the cloud and not with the actual infrastructure of the cloud service. Bring Your Own Key to the Cloud.

Cloud 91

Migrating Workloads to the Cloud with IBM Cloud Paks

Perficient Data & Analytics

This is the first in our series on IBM Cloud Paks. According to a study by McKinsey & Company , IT teams are migrating the simplest workloads to the cloud, but about 80% of workloads are still on-premises. This is because the basic cloud model does not address transformation complexities like skills gaps, compliance, integration issues, or vendor lock-in. IBM Cloud Paks run wherever Red Hat OpenShift runs and are optimized for productivity and performance.

Cloud 50