Over the past two years, AI enabled by a cloud interface has ushered in the age of cloud 3.0. The industry is evolving faster than anyone could predict, forcing organizations to rethink their security and risk strategies, said Jim Reavis, CEO and co-founder at Cloud Security Alliance.
A ransomware group is targeting Amazon S3 buckets, exploiting the data stored there using AWS's server-side encryption with customer keys and demanding a ransom in exchange for the encryption key needed to unlock the data. The group uses compromised or publicly exposed AWS account credentials.
The debate between pure-play cloud security solutions and integrated platforms intensifies as the market consolidates. While pure-play vendors such as Wiz offer innovation and deep functionality, platforms such as Palo Alto Networks and CrowdStrike provide cost-effective and comprehensive options.
To combat AI threats in 2025, security teams are set to enter the second phase of AI innovation in security by deploying semi-autonomous operations such as alert parsing, creation of high-priority item lists and risk remediation, said Jamie Collier, senior threat intelligence advisor at Mandiant.
The financial services sector stands at a crossroads: embrace robust cybersecurity or risk becoming the next headline. With attackers exploiting advances in cloud, AI, and remote access, traditional defences are no longer enough.
This playbook equips cybersecurity leaders with the tools to:
Detect and deter emerging...
By acquiring Cado Security, Darktrace strengthens its ability to secure multi-cloud environments. The transaction brings together Cado's forensic capabilities with Darktrace's AI analytics to deliver comprehensive threat detection and response to organizations in regulated industries.
Join us for an unfiltered conversation on cloud data protection with Corey Quinn, the “Chief Cloud Economist” at The Duckbill Group and a well-known AWS commentator.
Welcome to Information Security Media Group's AWS re:Invent 2024 Compendium featuring the latest insights from the industry's premier cloud computing conference and the perspectives of CIOs, CISOs and other technology leaders on the future of IT and how to secure it.
In the latest weekly update, Troy Leach, CSO at Cloud Security Alliance, joined three editors at Information Security Media Group to discuss important cybersecurity issues, including the rise of agentic AI, heightened scrutiny on third-party risks and the global focus on adopting zero trust and MFA.
Watch now for an unfiltered conversation on cloud data protection featuring the sharp-witted Corey Quinn, “Chief Cloud Economist” at The Duckbill Group and popular AWS commentator
There has been a seismic cloud revolution since 2020. But how have the threat landscape and response kept pace? Vijit Nair of Corelight opens up on the tools and teams needed to help cloud security programs evolve to match cloud-era threats and adversaries.
Traditional cybersecurity focuses on reducing MTTR, but what if the goal was to slow attackers down and limit their impact?
Join Stav Sitnikov, CPO of Stream.Security, for a webinar on using canaries to proactively mitigate threats in cloud environments.
Some key takeaways from this session include:
How...
A serving member of the U.S. Army has been arrested on a two-count indictment tied to the theft and sale of "confidential phone records," reportedly tied to the theft of terabytes of data from AT&T, Verizon and other customers of cloud data warehousing platform Snowflake.
A security snafu at a Volkswagen subsidiary exposed vehicle information and ownership details on approximately 800,000 cars, including precise location data and owners' personal profiles. A whistleblower found a vulnerability in the cloud storage accounts of Volkswagen subsidiary Cariad.
Scott Harrell, CEO of Infoblox, explores the convergence of network operations, security operations and cloud operations to tackle hybrid infrastructure complexities. He introduces Universal DDI and emphasizes a shift toward proactive threat management to counter AI-driven malware.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.