Capital One breach exposes over 100 million credit card applications

Credit to Author: Pieter Arntz| Date: Fri, 02 Aug 2019 16:00:00 +0000

The Capital One data breach is an exceptional example, if only because of how much we already know. Not only that, but the breach happened to one of the technical front-runners in banking.

Categories:

Tags:

(Read more…)

The post Capital One breach exposes over 100 million credit card applications appeared first on Malwarebytes Labs.

Read more

Migrating Network Protection to the Cloud with Confidence

Credit to Author: Trend Micro| Date: Thu, 11 Jul 2019 12:11:50 +0000

For modern organizations, speed and agility is the key to success – built on enhanced IT efficiency and performance driven by the cloud. Anything less could see your business outpaced by the competition. As always, security must be a priority when migrating to the cloud, but network teams are being let down by existing tools….

The post Migrating Network Protection to the Cloud with Confidence appeared first on .

Read more

AWS re:Inforce 2019 re:Cap

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Thu, 27 Jun 2019 18:31:29 +0000

A wide angle shot of the conference registration desk for AWS re:Inforce with an endcap wall in a slight teal blue saying, "Welcome to AWS re:Inforce"

The inaugural AWS Cloud security conference—AWS re:Inforce—was held in Boston this week. Well over 8,000 attendees descended on the Boston Convention and Exhibition Center for two days jammed packed with security education and cloud content. This was a very interesting conference because the dynamics of the attendees felt very different from typical AWS events. Usually…

The post AWS re:Inforce 2019 re:Cap appeared first on .

Read more

Attacking Containers and runC

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Tue, 12 Feb 2019 19:22:35 +0000

This week a new vulnerability was published (CVE-2019-5736) that highlights everything bad and good about containers. Simply put, this vulnerability can be exploited using an infected container to attack the host. It’s a real world example of a breakout attack that has long been a major concern in virtualized and container environment. Here, the attack…

The post Attacking Containers and runC appeared first on .

Read more

Server Security for the Modern IT Ecosystem

Credit to Author: Trend Micro| Date: Thu, 03 Jan 2019 15:30:46 +0000

A Changing Landscape In recent years we’ve seen a fundamental shift in the IT landscape, accelerated towards cloud and containerized infrastructures. According to Forbes, by 2020 it is predicted that 83 percent of enterprise workloads will be in the cloud. Moving beyond the cloud, software development teams are driving further change with the adoption of…

The post Server Security for the Modern IT Ecosystem appeared first on .

Read more

AWS Security Hub and Deep Security

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Wed, 28 Nov 2018 20:33:14 +0000

Deep Security and AWS Security Hub integration

One of the biggest challenges in maintaining your security posture is visibility. You have security controls deployed throughout the stack, and each fo these tools is generating its own set of data points and has its own view of your deployment. Managing the multitude of alerts and events from these tools can quickly get overwhelming….

The post AWS Security Hub and Deep Security appeared first on .

Read more

Securing Containers in The AWS Cloud with Trend Micro

Credit to Author: David Clement| Date: Tue, 27 Nov 2018 21:42:23 +0000

Rapid adoption of containers is changing the way that businesses build their applications. Services like Amazon ECS, Amazon EKS, and AWS Fargate let builders focus on solving business problems instead of managing infrastructure. But the move to containers also requires a shift in how you approach security. Dynamic environments require security that integrates with CI/CD…

The post Securing Containers in The AWS Cloud with Trend Micro appeared first on .

Read more