blog-banner.jpg

Total Cloud Security Blog

Gartner: 5 Things You Must Absolutely Get Right for Secure IaaS and PaaS

By Juan Lugo  |  May 26, 2020 at 5:00 AM  | 
Screen Shot 2020-05-20 at 9.29.36 AM

Cloud adoption has revolutionized the way that businesses share and access information. It has stretched across all industries, including those that are regulated or highly security conscious. Today, infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) solutions provide extensive flexibility and productivity gains to enterprises around the world.

Read More

Bitglass Security Spotlight: 6.5 Million Registered Voters Exposed in Israel, Three Weeks Before the Election

By Juan Lugo  |  March 2, 2020 at 5:00 AM  | 
Newspaper Icon with News Title - Red Arrow on a Grey Background. Mass Media Concept.

Here are the top stories of recent weeks:

  • Over 6.5 Million Israeli Voters Exposed in Online Voter Registry
  • Phishing Scam Costs Puerto Rican Government Over $2.6 Million
  • Nedbank, South Africa’s Predominant Bank is the Latest Victim of a Breach Affecting 1.7 Million Customers
  • Popular Photo Printing Mobile Application Exposed in Breach Affecting 10,000 Users
  • A Mismanaged S3 Bucket Results in a Breach Affecting 49 Million Individuals

Read More

Bitglass Security Spotlight: Cancer Centers Halted Due to Cyberattack

By Juan Lugo  |  December 18, 2019 at 5:00 AM  | 
Newspaper Icon with News Title - Red Arrow on a Grey Background. Mass Media Concept.

Here are the top stories of recent weeks:  

  • Ransomware Attack Halts Two Cancer Radiation Treatment Centers
  • Cloud Based Storage Bucket Exposed with Over 750,000 Users’ Applications 
  • A Massive Trove of Email Addresses and Passwords Left Online Without Any Protection
  • Microsoft Warns Other Organizations of Threat Actor Group, Gallium 
  • Gas Station PoS Systems Under Attack in North America, Visa Warns
Read More

Appeasing the Oasis of Unknown: Shadow IT Discovery

By Samantha Nguyen  |  October 15, 2019 at 5:00 AM  | 
Abstract blue text background

In a sea of millions of apps, which one is the biggest fish to fry? Firewall and proxy logs catch the traffic of users, but identifying what needs attention in such comprehensive logs can be overwhelming. Shadow IT discovery offers the ability to narrow down the search to apps that should be more closely monitored and controlled.

 

Read More
FOLLOW US