Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

10 Tips to Keep Your Cloud Storage Safe and Secure

Across the globe, we are all now always connected. People now share, upload, and download information from their phones or computers. Cloud-based storage has become incredibly popular because everything is accessible. And with multiple devices synced, you'll never have to worry about forgetting a file again. However, it's not without risks. If someone gets access to your account credentials, they could potentially view all your data stored in the cloud.

Cloud security fundamentals part 1: Know your environment

140,000 Social Security numbers and about 80,000 bank account numbers — that’s what one attacker stole from a major financial institution back in 2019. How did it happen? The attacker used firewall credentials to obtain privilege escalation and hack into improperly secured Amazon cloud instances.

The 6 Biggest Challenges of REST API Testing

Securing REST APIs is particularly difficult since they are highly interconnected and not designed for manual access. To save time and be more efficient, many developers rely on testing solutions that can automatically detect REST API endpoints and test parameter properties within them. In this article, I want to provide an overview of the 6 biggest challenges of REST API security testing and how test automation can help resolve them.

Forescout Wins IoT Security Solution of the Year Award

It’s with great pleasure that we announce that Forescout has been awarded with “Overall IoT Security Solution of the Year” for our Forescout Continuum Platform in the 6th annual CyberSecurity Breakthrough Awards. This is the second consecutive year Forescout has been an award recipient in the CyberSecurity Breakthrough Awards in recognition of the support we offer to our customers and the larger cybersecurity industry.

The State of AWS Security

In the cloud, securing identities and workloads is both paramount and complex. Inventories of AWS customer security breaches help us learn from publicly disclosed incidents—but until now, not much concrete data has been shared around the usage of security mechanisms that could have helped prevent these incidents. For this report, we examined real-world data from a sample of more than 600 organizations and thousands of AWS accounts that use the Datadog Cloud Security Platform.

Data Privacy in Healthcare: An Introduction to Protecting Patient Data

Healthcare organizations routinely handle large amounts of sensitive data, making data privacy in healthcare a top priority. Protecting patient data is not just about compliance—it’s crucial for maintaining patient confidentiality and safety. Unauthorized access can be severely detrimental, leading to breaches that compromise medical records and erode trust. Over the years, the digital revolution in healthcare has greatly elevated patient care standards.

Holistic Cybersecurity for Government IT/IoT/OT Converged Networks

Government agencies rely on IoT and OT devices to carry out their missions and manage everything from security cameras and personal identity verification (PIV) card readers that monitor and control access to facilities and data, to environmental controls that improve comfort, safety and efficiency. Data centers couldn’t operate around the clock without tightly controlled air conditioning, electricity and other physical infrastructure, much of which relies on IoT.

Flexible, Edge-directed Meshes: Why SASE is the Future of Cybersecurity

The tectonic plates of network security are in motion. A wrenching transference from on-premises to cloud-centric data security systems is gaining steam. Security teams are engaged in pushing cybersecurity out to the far edges of a highly interconnected, widely dispersed digital environment; and at the same time, they must find smarter ways to dramatically improve cyber hygiene.

How To Store Employee Personal Data Securely and Why It Matters

As an employer, you have both a moral and legal obligation to shore up sensitive information about your employees. Sensitive information includes genetic and biometric data, medical records, SNNs (social security numbers), and criminal history records, just to name a few. Fail to do so, and you will open yourself up to loads of risk. Hackers are constantly on the hunt for applicant and employee data that they can further sell on the dark web or use to perpetrate fraud.