Cybersecurity

CloudCheckr Offers Enhanced Cybersecurity Solutions Through AWS Marketplace for AWS GovCloud (US)

Grazed from CloudCheckr

CloudCheckr, the enterprise cloud management platform, today announced the availability of its software products on Amazon Web Services (AWS) Marketplace for AWS GovCloud (US), the platform for public sector software and compliance-focused solutions for regulated IT workloads. AWS GovCloud (US) bolsters the ability of government and government-related organizations to transform and modernize their digital operations using the cloud. The availability of AWS Marketplace in the region allows customers to streamline processes and discover reliable cloud management vendors with advanced security and compliance capabilities. With the announcement of AWS Marketplace for AWS GovCloud (US), customers may access CloudCheckr services in AWS Marketplace.

"Public sector organizations are increasingly gaining operational advantages when moving to the cloud," said Barry Russell, General Manager of Global Business Development, AWS Marketplace and Service Catalog, Amazon Web Services, Inc. "Our customers want easy-to-deploy solutions to drive data-driven operational efficiencies and speed innovation. CloudCheckr has demonstrated deep experience in cybersecurity and cloud management and we look forward to having their solutions on AWS GovCloud Marketplace."

Major factors impacting cloud security

Grazed from InformationAge. Author: Nick Ismail.

Companies that adopt cloud within their organisation can release products quicker, protect their customer data from security threats, and achieve economies of scale at a faster rate than companies with traditional IT environments. However, the shared nature of cloud computing also means that there is a real possibility that organisations could face security threats after they move to the cloud. This article will cover a few of the most common cloud security threats and explain what steps you can take to protect your business online.

Data breaches

Recent data breaches such as WannaCry and Petya have shown that the cloud isn’t completely immune to threats that traditional company networks face. Data breaches that involve sensitive company information is especially problematic for businesses, and can even lead to significant fines and lawsuits...

Read more from the source @ http://www.information-age.com/major-factors-impacting-cloud-security-123468244/

Google to reveal technical details of Titan security chip for cloud computing networks

Grazed from IndianExpress. Author: Editorial Staff.

Alphabet Inc’s Google this week will disclose technical details of its new Titan computer chip, an elaborate security feature for its cloud computing network that the company hopes will enable it to steal a march on Amazon.com Inc and Microsoft Corp. Titan is the size of a tiny stud earring that Google has installed in each of the many thousands of computer servers and network cards that populate its massive data centers that power Google’s cloud services.

Google is hoping Titan will help it carve out a bigger piece of the worldwide cloud computing market, which is forecast by Gartner to be worth nearly $50 billion. A Google spokeswoman said the company plans to disclose Titan’s technical details in a blog post on Thursday...

Read more from the source @ http://indianexpress.com/article/technology/tech-news-technology/google-touts-titan-security-chip-to-market-cloud-services-4809576/

Rackspace Launches New Privacy and Data Protection Offering

Grazed from Rackspace

Rackspace today announced the launch of Privacy and Data Protection (PDP), a new cybersecurity offering designed to help identify and protect sensitive data in a customer's environment such as intellectual property, customer payment information and personally identifiable information, while meeting strict compliance requirements around securing data at rest. The new PDP offering represents a key part of a unified security operation approach that businesses need to help ensure their organization is protected.

According to a recent Forrester Research report, an alarming 49 percent of global network security decision-makers report that they experienced at least one breach during the past 12 months. The continued increase in security related incidents is forcing Chief Risk and Chief Compliance officers in particular to reevaluate the way their organization handles sensitive customer data to ensure that it is both secure and accessible only by authorized users. The new offering provides businesses with a fully managed data protection service, including data classification, data access policies, encryption and activity reporting, which can be easily integrated with existing applications without requiring code changes.

Trend Micro Deep Security Launches in AWS GovCloud Marketplace

Grazed from Trend Micro Inc.

Reinforcing continued innovation and understanding of government compliance requirements, Trend Micro Incorporated, a global leader in cybersecurity solutions, announced the availability of Deep Security in the recently launched Amazon Web Services (AWS) GovCloud Marketplace. As an AWS Advanced Technology Partner for more than eight years, Trend Micro enables customers with the tools needed to secure highly compliant workloads in the cloud, while increasing operational efficiency and helping customers to maximize the benefits of moving to the cloud all while remaining compliant.

Trend Micro is a chosen cyber security partner for many government agencies. NASA worked with MindPoint Group to solve business challenges for the NASA WESTPrime project. "While working on the NASA WESTPrime project, it's been truly evident that Trend Micro's Deep Security on AWS GovCloud Marketplace is a game changer for government AWS users," said Keith Rhea, Senior Security Engineer for MindPoint Group, LLC. "The product is certified and credible, reinforcing Trend Micro's understanding of government compliance and ensuring protection across all cloud environments. Additionally, this innovative solution offers multiple capabilities in a single product, minimizing our operational costs for security tools."

Can the Cloud Protect Your Data?

Article Written by Avery Phillips

For most people, the cloud is this otherworldly thing that they don't completely understand. Yes, your data is there, and yes, occasionally other people can access it, but is it safe? Can you guarantee who is able to access your data, or is it a free-for-all? 

Well, the answer to that is more complicated than you think. On one hand, some severe cyberattacks could have been avoided if the victims had been using cloud services instead. On the other, there is always the risk that someone unauthorized will be able to access your data. This might seem like a double-edged sword, but one end is clearly sharper than other upon closer inspection.

Cavirin's Continuous Security for Hybrid Workloads Adds Monitoring and General Data Protection Regulation (GDPR) Support

Grazed from Cavirin Systems, Inc.

Cavirin Systems, Inc., offering continuous security assessment and remediation for hybrid clouds, containers, and data centers through correlated risk scoring and simple deployment, announced today additional continuous monitoring capabilities as well as GDPR support, critical for organizations doing business in or with the European Union (EU). Other new benchmarks supported include the Health Information Trust Alliance (HITRUST) as well as guidelines issued by the New York Department of Financial Services (NYDFS) and the Criminal Justice Information Services (CJIS).  

Cavirin's microservices-based assessment and remediation platform is agentless, permitting multiple deployment options across private/on-premise environments as well as public clouds. The platform's new capabilities offer event-driven security monitoring with a real-time view of any and all changes to the organization's on-premise and/or cloud infrastructure and assesses the impact on the security posture. These capabilities eliminate the need for an agent, which can introduce performance and maintenance issues and add management overhead to already stretched IT operations teams. The security monitoring of AWS cloud workloads is greatly simplified by the integration of Cavirin's platform with CloudTrail, which provides flexibility for configuring and creating alerts for specific security events and the automated remediation that might follow.

Rivetz Introduces Decentralized Cybersecurity Token to Secure Devices

Grazed from TheMerkle. Author: Editorial Staff.

Rivetz Intl., a newly formed subsidiary of Rivetz Corp., today announced the RvT cyber security token, created to combine trusted computing with blockchain technology that can offer comprehensive privacy protection. Rivetz believes the RvT token will enable multi-factor authentication across devices, to achieve provable security at the transaction and authentication level.

Furthermore, Rivetz believes the solution will enable peer-to-peer transactions to have provable cyber controls that become a permanent part of the blockchain record, providing cryptographic proof that the measured protections were in place before a transaction can execute. The Rivetz solution is built on technology that has already been delivered on over a billion devices containing ARM-compatible processors...

Druva Releases Annual Enterprise Ransomware Report

Grazed from Druva

Druva, the leader in cloud data protection and information management, today announced the results of its Annual Ransomware Report. The report reveals ransomware as the great equalizer, a ubiquitous global threat affecting enterprises large and small and devices of all types. With over 800 companies participating, the report uncovered that over 80 percent of respondents reported ransomware attacks are on the rise and that  half of businesses hit by ransomware were attacked multiple times. To combat the increase in these attacks, eight out of ten organizations turn to modern backup solutions as the most effective strategy to minimize costly downtime and crucial data loss.    

Ransomware has quadrupled over the past year, reaching an estimated $1 billion in 2016 with 4,000 attacks occurring per day. As further proven by the recent, widespread attack known as WannaCry, protecting against ransomware is paramount for companies of all sizes and industries. With an increased technological sophistication among attackers, today's IT organizations are becoming more vigilant and proactive to mitigate data damage caused by attacks and fully prepare to swiftly and seamlessly recover from them.

How to approach cloud computing and cyber security in 2017

Grazed from Information-Age. Author: Ben Rossi.

The adoption of cloud computing has been on the up since as far back as 2008, when a survey conducted by the Pew Research Institute found that cloud services were used by nearly 69% of Americans. Since then, the industry has experienced hyper-growth and exceeded the already vast predictions of how big it would become.

IDC predicts that the cloud computing market in 2017 will be worth $107 billion and, according to Gartner, by 2020 a corporate ‘no-cloud’ policy will be as unusual as a ‘no-internet’ policy would be today. Indeed, it would be difficult to imagine an organisation in 2017 that did not use webmail, file sharing and storage, and data backup...