Tag: cloud
-
»manage it« TechTalk: Darum ist der Swissbit iShield Key 2 ein echter Alleskönner
Der Swissbit iShield Key 2 ist ein echter Alleskönner, schenkt man den Worten von Jan M. Quack von der Swissbit AG Glauben. Warum das so ist und warum wir Jan ausgerechnet am Stand von RSA Security getroffen haben, erzählt er uns in 80 Sekunden. Entstanden ist das Video auf der European Identity Cloud Conference 2025.…
-
PowerShell überwachen so geht’s
Tags: access, cloud, cyberattack, detection, hacker, login, mail, microsoft, monitoring, powershell, tool, windowsWird PowerShell nicht richtig überwacht, ist das Security-Debakel meist nicht weit.Kriminelle Hacker setzen mitunter auf raffinierte Techniken, um sich über ausgedehnte Zeiträume in den Netzwerken von Unternehmen einzunisten und still und heimlich sensible Daten oder Logins abzugreifen. Dabei missbrauchen die Cyberkriminellen in vielen Fällen auch vom jeweiligen Zielunternehmen freigegebene Tools, um sich initial Zugang zu…
-
Improving NHIs Management in Your Organization
Is Your Organization Harnessing the Full Power of Non-Human Identities? The increasing reliance on automation and cloud computing in industries such as healthcare, financial services, and travel, has led to a surge in Non-Human Identities (NHIs). Deployed effectively, these machine identities can significantly streamline operations. However, their management presents a new layer of complexity in……
-
German BSI Head: Tech Sovereignty Needs Technical Solution
Claudia Plattner Says Complete Switch to European Technologies Is Unrealistic. European ambitions to replace foreign tech solutions with domestic alternatives are unrealistic in the short term, warned the head of the German cybersecurity head cybersecurity agency in a call for greater technological control over cloud platforms. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/german-bsi-head-tech-sovereignty-needs-technical-solution-a-28868
-
Cloudflare confirms Russia restricting access to services amid free internet crackdown
Russia has been cracking down on Cloudflare for months, with similar restrictions imposed on other foreign cloud and hosting providers. First seen on therecord.media Jump to article: therecord.media/cloudflare-russia-restricting-access-crackdown
-
Tackling Cloud Security Challenges in Runtime Environments
Rinki Sethi, chief security officer for Upwind, unpacks why runtime is the new battleground for cloud defense. Sethi traces her epiphany back to 2022, when she first heard that you can’t secure what you can’t see in real time. Configuration checks and compliance scans are fine, she says, but attackers still slip through unless you’re..…
-
Microsoft Defender for Office 365 now blocks email bombing attacks
Microsoft says its Defender for Office 365 cloud-based email security suite will now automatically detect and block email bombing attacks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/microsoft-defender-for-office-365-now-blocks-email-bombing-attacks/
-
How to Chart an Exposure Management Leadership Path for You, Your Boss and Your Organization
Tags: access, attack, automation, breach, business, ciso, cloud, container, cybersecurity, data, defense, exploit, identity, incident response, iot, jobs, kubernetes, ransom, regulation, risk, security-incident, service, soc, threat, tool, vulnerability, vulnerability-managementEach Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, we share some tips on how to lead the move to exposure management. You can read the entire Exposure Management Academy series here. For years, organizations poured resources into reactive…
-
Sysdig Extends AI Agent Reach Across Portfolio
Sysdig has fully integrated an artificial intelligence (AI) agent across its cloud native application protection platform (CNAPP) to both identify and explain threats, along with remediation suggestions. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/06/sysdig-extends-ai-agent-reach-across-portfolio/
-
Unternehmen haben Schwierigkeiten ihre wachsenden, KI-gesteuerten Cloud-Umgebungen abzusichern
Thales hat die Ergebnisse seiner
-
Unternehmen haben Schwierigkeiten ihre wachsenden, KI-gesteuerten Cloud-Umgebungen abzusichern
Die Cloud ist inzwischen ein wesentlicher Bestandteil der modernen Unternehmensinfrastruktur, aber viele Unternehmen sind noch dabei, die erforderlichen Kompetenzen und Strategien für eine effektive Absicherung aufzubauen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/unternehmen-haben-schwierigkeiten-ihre-wachsenden-ki-gesteuerten-cloud-umgebungen-abzusichern/a41263/
-
»manage it« TechTalk: Darum wird die identitätszentrische Sicherheit immer wichtiger
Mit Matt Graves durften wir auf der diesjährigen European Identity Cloud Conference über das Thema Identity Access Management sprechen. In diesem Kontext wollten wir von ihm wissen, warum die identitätszentrische Sicherheit immer wichtiger wird und wie OpenText dabei helfen kann. First seen on ap-verlag.de Jump to article: ap-verlag.de/manage-it-techtalk-darum-wird-die-identitaetszentrische-sicherheit-immer-wichtiger/97024/
-
Are we securing AI like the rest of the cloud?
In this Help Net Security interview, Chris McGranahan, Director of Security Architecture Engineering at Backblaze, discusses how AI is shaping both offensive and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/06/30/chris-mcgranahan-backblaze-ai-cloud-security/
-
Attacken in der Cloud und On-Premises präventiv abwehren One Single Source of Truth
Im Interview erläutert Lothar Geuenich, VP Central Europe bei Check Point Software Technologies, die Vorteile der Infinity-Plattform, den Einsatz von KI und die Anforderungen der Kunden. Durch den Hybrid-Mesh-Ansatz werden hybride Umgebungen sowohl in der Cloud als auch On-Premises abgedeckt. First seen on ap-verlag.de Jump to article: ap-verlag.de/attacken-in-der-cloud-und-on-premises-praeventiv-abwehren-one-single-source-of-truth/96780/
-
Innovating NHIs Management for Better Security
Is Your Cloud Environment as Secure as You Think? Managing Non-Human Identities (NHIs) and Secrets is a critical concern. This is especially true for organizations making use of cloud environments, where threats often lurk undetected and unrecognized. But have you considered how innovative NHI management could transform your company’s approach to security? The ingenuity of……
-
Being Proactive with Your NHIs Management
How Important Is Proactive NHI Management? Have you ever considered the significance of proactive Non-Human Identity (NHI) management in securing your cloud? With companies become more digitally reliant, managing machine identities and their secrets has evolved into an essential part of corporate strategy. This proactive approach to NHI management offers several advantages, including risk reduction,……
-
Techscape for Startups in Cloud and Application Security
First seen on scworld.com Jump to article: www.scworld.com/native/techscape-for-startups-in-cloud-and-application-security
-
Stay Ahead: Upgrading Your NHI Strategy for Cloud Security
Why Upgrade Your NHI Strategy for Cloud Security? Cybersecurity threats have been steadily increasing, requiring cybersecurity professionals to frequently reassess and upgrade their strategies. A robust Non-Human Identities (NHIs) strategy, an essential aspect of data management, is often overlooked despite its crucial role in cloud security. So, why should organizations prioritize an NHI strategy upgrade?……
-
Is Investing in NHI Security Justified?
Is NHI Security Investment Justifiable for Your Organization? Is your organization making a concerted effort towards investing in Non-Human Identities (NHIs) security? Given the increasing sophistication of cyber threats, ensuring tight security controls over machine identities is becoming vital in every industry. This is particularly significant for businesses operating in the cloud, where NHIs and……
-
CVE-2025-5777, CVE-2025-6543: Frequently Asked Questions About CitrixBleed 2 and Citrix NetScaler Exploitation
Frequently asked questions about recent Citrix NetScaler ADC and Gateway vulnerabilities that have reportedly been exploited in the wild, including CVE-2025-5777 known as CitrixBleed 2. Background Tenable’s Research Special Operations (RSO) team has compiled this blog to answer Frequently Asked Questions (FAQ) regarding CVE-2025-5777 and CVE-2025-6543, two Citrix NetScaler ADC and Gateway vulnerabilities that have…
-
From Packets to Protection: How Network Observability Powers Security and Forensics
In cybersecurity, the old maxim >>you can’t secure what you can’t see
-
Hackers exploiting critical Citrix Netscaler flaw, researchers say
After confirming exploitation of a separate zero-day flaw, Cloud Software Group promises to be transparent. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/hackers-exploiting-citrix-netscaler-flaw/751878/
-
Navigating a Heightened Cyber Threat Landscape: Military Conflict Increases Attack Risks
Tags: advisory, ai, attack, authentication, breach, business, cloud, container, control, cyber, cyberattack, cybersecurity, data, data-breach, defense, detection, exploit, finance, firmware, group, hacker, hacking, Hardware, identity, infrastructure, intelligence, Internet, iran, mfa, military, network, password, risk, russia, service, strategy, tactics, technology, terrorism, threat, tool, update, vulnerability, vulnerability-managementThe current geopolitical climate demands a proactive, comprehensive approach to cybersecurity. Here’s what you need to know, and how Tenable can help. The cybersecurity landscape is in constant flux, but rarely do we see such a rapid escalation of threats as we are currently experiencing. The U.S. Department of Homeland Security’s (DHS) National Terrorism Advisory…
-
Frequently Asked Questions About Iranian Cyber Operations
Tags: access, advisory, api, apt, attack, authentication, awareness, cisa, cloud, credentials, cve, cyber, cybersecurity, data, data-breach, defense, dos, exploit, finance, framework, government, group, Hardware, identity, infrastructure, injection, Internet, iran, ivanti, malware, mfa, microsoft, middle-east, military, mitre, monitoring, network, password, ransomware, rce, remote-code-execution, risk, service, software, supply-chain, tactics, technology, terrorism, threat, tool, update, vpn, vulnerability, windowsTenable’s Research Special Operations team focuses on some frequently asked questions about Iranian cyber operations, including the tactics, techniques and procedures employed by Iran-based threat actors. Background Tenable’s Research Special Operations (RSO) team has compiled this blog to answer Frequently Asked Questions (FAQ) regarding Iranian cyber operations in the wake of the recent conflict and…
-
How to Keep Client Data Safe in a World Full of Online Threats
Businesses, big or small, must prioritize data security not only to maintain trust but also to stay compliant with evolving regulations. This article explores practical, actionable strategies to safeguard client information, including encryption, access control, employee training, and secure cloud practices. Learn how to build a resilient security culture that protects your clients and your…
-
KI-Analyst für Cloud-Sicherheit
Sysdig, der führende Anbieter von Cloud-Sicherheit in Echtzeit, gab die vollständige Integration von Sysdig-Sage in seiner Plattform bekannt. Damit können Sicherheits- und Entwicklungsteams mit Unterstützung von Sysdigs KI-gestütztem Cloud-Sicherheitsanalysten Risiken identifizieren, untersuchen und beheben. Als erster KI-Analyst, der vollständig in eine Cloud-native Plattform zum Schutz von Anwendungen (CNAPP) integriert ist, verbessert Sysdig-Sage die Geschwindigkeit, Präzision…
-
6 key trends redefining the XDR market
Tags: access, ai, apache, attack, cloud, country, crowdstrike, cybersecurity, data, detection, edr, endpoint, framework, identity, incident response, infrastructure, intelligence, marketplace, microsoft, ml, monitoring, msp, mssp, network, office, open-source, ransomware, service, siem, soc, sophos, threat, toolXDR-as-a-service on the rise: A fully staffed SOC is out of reach for many organizations and that’s why the rise of XDR-as-a-service reflects growing demand for managed, scalable security capabilities.”With stretched teams and expanding attack surfaces, many organizations are turning to trusted providers to deliver round-the-clock detection and response,” says Santiago Pontiroli, lead security researcher…
-
Is Your Secrets Management Getting Better?
Are Your Cybersecurity Strategies Evolving Effectively? The question arises: Is your secrets management improving? These days, robust secrets management isn’t a luxury but a necessity, especially for businesses dealing with cloud technology. Transforming your cyber strategies to effectively manage Non-Human Identities (NHIs) and secrets holds the key to minimizing risks and boosting security across various……
-
Building Trust in Your NHI Security Measures
How Reliable are Your Non-Human Identity Security Measures? Have you ever questioned the trustworthiness of your Non-Human Identity (NHI) security measures? With the increasing adoption of NHIs, due to the cloud’s efficiency and scalability, it’s paramount that effective management of these identities is in place. However, striking a balance between robust security measures and the……

