Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloud

How to Protect Your Cloud Assets from Being Cryptojacked

Cryptojacking attacks have become the most prevalent type of attack on cloud native infrastructures. For example, in 2022, there were 139M cryptojacking attacks, but the following year there were over 1 billion! That translates to nearly 3M cryptojacking attacks every day, on average in 2023.

Cloud Security and Compliance: A Smarter Approach to Keeping Your Head Above Water

When it comes to cloud security and compliance, it’s easy to feel like you’re drowning in a sea of regulations and requirements. But don’t worry; we’re all in the same boat! That’s why we’re thrilled to share our latest point-of-view (POV) paper, “Practical Cloud Security in the Era of Cybersecurity Regulation,” which is crafted with our deep industry expertise and experience.

How to stay ahead of AWS Lambda costs

Severless is excellent, right? Faster development and less infrastructure hassle – but those AWS Lambda costs can sneak up on you. Over 70% of AWS customers are using serverless now. Seems like everyone’s jumping on the serverless bandwagon – and for good reason. It speeds up development and cuts down on the nitty-gritty infrastructure stuff. All this is a developer’s dream in a lot of ways.

Dani Grant (Jam.dev) | Fixing Bugs, Building a Company, and the Future of the Web

Dani Grant, co-founder of Jam.dev, talks about her company, how they are trying to fix the bug process for developers, and also discusses how Jam.dev uses Cloudflare. We also go over what a better internet for the future looks like, and the challenges and opportunities in the AI era.

Enhancing AWS Security: Comprehensive Strategies for Robust Cyber Protection

With the rapid expansion of cloud computing, Amazon Web Services (AWS) has become a cornerstone for businesses seeking scalable and flexible IT solutions. However, this increased reliance on AWS has made it a prime target for cyber threats. Ensuring robust security measures within AWS environments is paramount to safeguarding sensitive data and maintaining business continuity.

UniSuper's $125 Billion Cloud Catastrophe: Google's Accidental Deletion Reinforced the Importance of Backup Solution

The recent data loss incident involving UniSuper, a major financial player and Google Cloud serves as a reminder of the importance of implementing robust backup and disaster recovery solutions. Let’s delve into the details of the incident and explore why backups are essential for safeguarding against data disasters.

The Future of Work: Ensuring Holistic Security in Hybrid Environments

In today's rapidly evolving work culture, the shift towards hybrid environments demands a revolutionary approach to security. At Brivo, we're at the forefront of integrating cutting-edge technology to create not just safer, but smarter workspaces. Dive into our latest video where Mary Clark, a leading voice in security solutions, unveils the importance of a holistic, data-driven strategy to safeguard your hybrid workspace. From access control to employee well-being, discover how Brivo's innovative solutions are shaping the future of work.

Cloud Unfiltered with Sathish Balakrishnan - Exploring the Future of AI and Automation - Episode 12

Join host Michael Chenetz on this enlightening episode of Cloud Unfiltered as we dive deep into the realms of AI and automation with special guest Sathish Balakrishnan from Red Hat. Sathish, who leads the Ansible Automation Platform business, shares his valuable insights on how AI is enhancing automation technologies and the critical role of automation in leveraging AI effectively across industries.

Google Cloud affected by CVE-2021-30476

CVE-2021-30476 affects HashiCorp's Terraform Vault Provider and involves incorrect configuration of bound labels for GCP (Google Cloud Platform) authentication. This issue permits unauthorized users to potentially bypass authentication mechanisms. The vulnerability stems from the Vault provider not correctly configuring the bound labels within the GCP authentication method, which could lead to improper access control.