Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Aligning Falco's Cloudtrail Rules with MITRE ATT&CK

This blog will explain how Falco’s Cloudtrail plugin rules can be aligned with MITRE ATT&CK Framework for Cloud. One important note is that the team at MITRE has developed several different matrices to address the unique risk associated with adversaries in the cloud, in containerized workloads as well as on mobile devices.

The Biggest Cloud Security Challenges in 2023 and How to Avoid Them

With the rapid growth of cloud technology, it is no surprise that security has become a major concern for organizations. Cloud computing provides numerous advantages in terms of cost savings and scalability, but these benefits come with risks. As businesses move to the cloud, they must be aware of the potential security threats and take appropriate steps to protect their data and systems from malicious actors.

Create AWS Honeytokens easily to catch hackers

learn how to create AWS Honey Tokens that alert you when someone attempts to use them. Honey tokens are API or access keys that are real but harmless and can be used as an early warning system to know when an intruder has made it into your system. In this video, we run through the simple steps to be able. to create your very own AWS Honey Tokens using an open-source project and all your own infrastructure.

Navigating the security challenges of multi-tenancy in a cloud environment

Multi-tenancy can maximize the number of resources that are utilized in a cluster by sharing these resources between different groups, teams, or customers. However, boundaries must be placed to avoid problems associated with resource-sharing. On top of that, in a multi-tenant cluster, the number of security policies might gradually grow to the point where a slight misconfiguration could cause major security problems, performance issues, and service disruptions.

Navigating cloud security: Insights from our 2023 outlook report

Cloud technology has become a crucial aspect of modern-day businesses due to its scalability and efficiency, making it a popular choice for organizations across all industries. However, the increased surface area for attacks and the different ways they can be executed has left many organizations vulnerable to threats and data breaches. The cloud threat landscape has been rapidly evolving, so adopting a robust cloud security strategy is essential for organizations of all sizes.

Public or Private Cloud: Choices to Consider

Organizations are progressively moving towards a predominantly cloud-based computing environment. What this means is that essentially all of their back-end infrastructure, systems, and client-facing applications can be accessed and distributed through the cloud. Modern cloud computing goes a step further than simply being present in a virtual environment.

Find threats: Cloud credential theft on Linux endpoints

The Sumo Logic Threat Labs team previously outlined the risks associated with unprotected cloud credentials found on Windows endpoints. This article builds on that work by providing detection and hunting guidance in the context of endpoints that run the Linux operating system. Although workloads that support business functionality are increasingly moving to the cloud, these workloads are often managed through an endpoint that is often found on premises.

Cloud Keys on Public GitHub, Ransomware & Other SaaS AppSec Stories | Alok (CTO, Goodmeetings)

🎙️ In this podcast, Alok Mishra (Co-Founder & CTO, Goodmeetings) discusses with Venky how he looks at security as a vital part of building any SaaS business. He shares his unplanned appointment with a Ransomware attacker and how it led him to build best practices to deal with Application Security problems. He even talks about some common security demands from customers and how fulfilling the expectations is a must for organizations 🧳

Why Application Dependencies Are Critical for Cloud Security

Application dependencies occur when technology components, applications, and servers depend on each other to provide a business solution or service. Developers have a specific technology stack in mind when building solutions. This can typically include operating systems, database engines, and development frameworks (such as.Net or Java), as well as other infrastructure.

OneLogin and AWS CloudTrail Lake Integration

As an AWS Partner, One Identity is proud to announce that it is now even easier to leverage your existing AWS tooling with your OneLogin data. We are among the first partners to offer a new integration that joins tools, such as our previously released AWS EventBridge webhook. Now, AWS and One Identity have teamed to deliver an integration with AWS CloudTrail Lake, which allows you to store your OneLogin event data in AWS along with all your other data.