cloud computing

Cybersecurity: CASB vs SASECybersecurity: CASB vs SASE

Cybersecurity: CASB vs SASE

Understanding cybersecurity aspects addressed by Cloud Access Security Broker (CASB) and Secure Access Service Edge (SASE) In an increasingly digital…

2 years ago
Experts warn of an emerging Python-based credential harvester named LegionExperts warn of an emerging Python-based credential harvester named Legion

Experts warn of an emerging Python-based credential harvester named Legion

Legion is an emerging Python-based credential harvester and hacking tool that allows operators to break into various online services. Cado…

2 years ago
IBM buys Red Hat for $34 Billion, it is largest software transaction in historyIBM buys Red Hat for $34 Billion, it is largest software transaction in history

IBM buys Red Hat for $34 Billion, it is largest software transaction in history

IBM announced it is going to buy the open source company Red Hat for $34bn with the intent to enhance its…

7 years ago
Tech giant Telstra warns cloud customers they’re at risk of hack due to a SNAFUTech giant Telstra warns cloud customers they’re at risk of hack due to a SNAFU

Tech giant Telstra warns cloud customers they’re at risk of hack due to a SNAFU

On May 4th Tech giant Telstra discovered a vulnerability in its service that could potentially expose customers of its cloud…

7 years ago
Amazon S3 outage. Increased error rates. Amazon AWS is downAmazon S3 outage. Increased error rates. Amazon AWS is down

Amazon S3 outage. Increased error rates. Amazon AWS is down

An Amazon AWS S3 outage is causing serious problems for a huge number of websites, applications, and Internet of Things…

8 years ago
Critical DOM XSS flaw on Wix.com put million websites at riskCritical DOM XSS flaw on Wix.com put million websites at risk

Critical DOM XSS flaw on Wix.com put million websites at risk

A DOM-based cross-site scripting vulnerability in the cloud-based development platform Wix.com put million websites at risk. The cloud-based development platform…

9 years ago
The US government created new rules for Cloud ProvidersThe US government created new rules for Cloud Providers

The US government created new rules for Cloud Providers

A new set of rules was created by the Department of Defense (DoD) for Cloud Providers to report security holes…

10 years ago
European cloud trends: Law reforms on cloud data protection is vital for the European CommissionEuropean cloud trends: Law reforms on cloud data protection is vital for the European Commission

European cloud trends: Law reforms on cloud data protection is vital for the European Commission

Law reforms on cloud data protection is vital for the European Commission (EC). The role of EC and EU has…

10 years ago
Shadow Cloud Services a serious risk for Government NetworksShadow Cloud Services a serious risk for Government Networks

Shadow Cloud Services a serious risk for Government Networks

Cloud Security Alliance revealed that shadow cloud service used by employees and unmanaged by IT can pose a major security…

10 years ago
Europol issued 2014 iOCTA report on evolution of cybercrimeEuropol issued 2014 iOCTA report on evolution of cybercrime

Europol issued 2014 iOCTA report on evolution of cybercrime

The Europol issued 2014 Internet Organised Crime Threat Assessment (iOCTA) report to provide details about on-going developments in the cyber…

11 years ago