A massive brute-force attack campaign used both legacy protocols and credential dumps to compromise cloud user accounts, according to security researchers.
Regardless of what cloud service model you adopt, it's important to consider security implications related to application development, data and contract management, and IT asset governance.
Moving identity management processes to cloud IAM services introduces benefits such as cost-efficiency, flexibility, faster deployments and simplified operations.
We're only a few months into the year, but HIMSS19 and Think 2019 have already helped shape this year's focus on enterprise transformation, innovation and global cybersecurity.
Depending on your needs, you can develop encryption solutions based on open standards from components you build and run yourself or source them as managed services from cloud providers.
Failure to consider security when developing a hybrid cloud can lead to unanticipated problems that don't exist in typical technology infrastructure.
While many CISOs are tempted to invest in as many new technologies as they can find to fight emerging threats, less is more when it comes to minimizing cybersecurity complexity.
In the rush to digital transformation, treating cloud security services as an afterthought to hybrid cloud adoption is an increasingly risky mistake.
There is no single answer to the question of how to best use data encryption. Depending on their application and data types, organizations will likely need to apply different architectural patterns.
Companies should look for a cloud security solution that sits in front of the database and can send traffic to your existing tools without having to install any software on the database.