Cisco Secure Workload 3.9 Delivers Stronger Security and Greater Operational Efficiency

Cisco Secure Workload 3.9 Delivers Stronger Security and Greater Operational Efficiency

The proliferation of applications across hybrid and multicloud environments continues at a blistering pace. For the most part, there is no fixed perimeter, applications and environments are woven together across datacenters and public cloud providers. The attack surface has expanded. Organizations struggle with a lack of visibility, and vulnerabilities are a constant issue for application and security teams alike. In some cases, the vulnerability is known and flagged, but there is no patch available, and…

Read More

Security Benefits of Enhanced Cloud Visibility

Security Benefits of Enhanced Cloud Visibility

A platform also provides you with the flexibility to choose the protection you need, which aligns with the security by design approach. With a platform, you can choose the cloud (hybrid or multi), the environments (public, private, virtual), and the tools necessary to securely meet your organization’s objectives. Security teams may feel over-burdened, and DevOps teams can be resistant to integrating security into their processes, as it often slows them down—that’s where platform-driven automation comes…

Read More

Achieving Cloud Compliance Throughout Your Migration

Achieving Cloud Compliance Throughout Your Migration

So, where do you start? Your first step should be identifying which security tool will best meet the needs of ever-changing compliance standards and will keep up with your evolving infrastructure. As we discussed in our last article, a security services platform is ideal. Here’s how it can help you with the four compliance challenges we mentioned earlier: Challenge #1: Data transfer ─ Localized protection Unlike point products, a platform can be deployed across multi-…

Read More

Benefits of Cloud Automation

Benefits of Cloud Automation

Benefits of Cloud Automation Workload Security Learn more about how cloud automation can simplify security controls, policies, and scans. By: Andrew Stevens April 18, 2023 Read time:  ( words) Related articles in the Cloud Migration series: Automation is the bedrock to innovation. It allows people to work smarter, not harder. Think of inventions like the dishwasher, laundry machines, and the robotic vacuum. All of these automate chores that are mundane, tedious, and time-consuming. You can…

Read More

Cloud Migration Security

Cloud Migration Security

Cloud Migration Security Workload Security Cloud migration is a journey, not a destination. Learn the basics of security for making the (gradual) switch, so you can get the most out of what the cloud has to offer. By: Andrew Stevens March 28, 2023 Read time:  ( words) Think of cloud migration like moving away from your childhood home. On the outset, leaving behind the familiar is difficult, but when you remind yourself about the dream…

Read More

4 Tips for Better AWS Cloud Workload Security

4 Tips for Better AWS Cloud Workload Security

There are a few key criteria that we need to consider and include in our cloud architectures to better protect our workloads in the AWS cloud. Vulnerability detection and prevention Protect against threats and ransomware Ability to send security events generated from different sources to a centralized platform in a simplified framework. Misconfigurations and lack of visibility for our cloud resources But odds are we have a few, to ensure the security of our workloads,…

Read More

Detect Azure AD Hybrid Cloud Vulnerabilities

Detect Azure AD Hybrid Cloud Vulnerabilities

Detect Azure AD Hybrid Cloud Vulnerabilities Workload Security AADInternals is a PowerShell module widely used by administrators for administering Azure Active Directory (AD) and Microsoft 365 – learn how to protect against their common vulnerabilities. By: Jiri Sykora, Sunil Bharti May 19, 2022 Read time:  ( words) What is AADInternals? AADInternals is a PowerShell module widely used by administrators for administering Azure Active Directory (AD) and Microsoft 365. As the name suggest it deals with…

Read More

Cryptojacking Attacks Target Alibaba ECS Instances

Cryptojacking Attacks Target Alibaba ECS Instances

Cryptojacking Attacks Target Alibaba ECS Instances Workload Security Discover how some malicious groups disable features in Alibaba Cloud ECS instances for illicit mining of Monero. By: Alfredo de Oliveira February 04, 2022 Read time:  ( words) Cryptojacking attacks continue to increase. Unlike ransomware, cryptojacking cybercriminals make their money staying silent and undetected, leeching the computer power from their target to mine valuable cryptocurrency. Cryptomining can cause serious downtime for developers by draining the enterprise’s processing…

Read More

How to Detect Apache Log4j Vulnerabilities

How to Detect Apache Log4j Vulnerabilities

How to Detect Apache Log4j Vulnerabilities Network Security Explore how to detect Apache Log4j (Log4Shell) vulnerabilities using cloud-native security tools. By: Nitesh Surana January 27, 2022 Read time:  ( words) In my previous blog, I reviewed how to detect Apache HTTP server exploitation from vulnerabilities in October. Weirdly enough, I wrote that article before the Apache Log4j (Log4Shell) news broke in December 2021. So I’m back to write about how to detect the infamous Log4j vulnerability (CVE-2021-44228) that…

Read More

How to detect Apache HTTP Server Exploitation

How to detect Apache HTTP Server Exploitation

In the above two requests and responses, we see the attacker fingerprinting vulnerable servers by running the ‘echo’ command. We observed successful exploitation attempts which led to cryptominers raking up compute on the vulnerable hosts. CVE-2021-40438:This CVE tracks the vulnerability posed by the ‘mod_proxy’ module in Apache HTTP Server (versions before 2.4.49). In CWE-918 Server-Side Request Forgery (SSRF) attack, a malicious actor can forward the request to an origin server of their choice In this…

Read More
1 2