- CheckMates
- :
- Products
- :
- CloudMates Products
- :
- Weekly Reports
- :
- Last Week in Cloud Security January 23 2025
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Last Week in Cloud Security January 23 2025
Check Point Securing the Cloud
How Grand Canyon Education Enhanced Their Cloud Security with CloudGuard
Educational institutions face unique challenges in maintaining robust cloud security. Grand Canyon Education (GCE) is a shared services partner dedicated to serving colleges and universities. GCE supports partner institutions’ students through operational functions that achieve organizational growth and student success.
|
|||
Vulnerabilities and Case Studies
How to Eliminate Identity-Based Threats
Despite significant investments in advanced technologies and employee training programs, credential and user-based attacks remain alarmingly prevalent, accounting for 50-80% of enterprise breaches[1],[2]. While identity-based attacks continue to dominate as the leading cause of security incidents, the common approach to identity security threats is still threat reduction, implementing layers of controls to reduce risk while accepting that some attacks will succeed. This methodology relies on detection, response, and recovery capabilities to minimize damage after a breach has already occurred, but it does not prevent the possibility of successful attacks.
|
|||
Non-Human Identities
OWASP Non-Human Identities Top 10:Forging a New Standard in Cloud Security
According to an analysis by the Orca Research Pod, non-human identities (NHIs) outnumber their human counterparts by an average of 50:1. With a rise in automated processes and AI services in the cloud, the number of NHIs continues to rapidly increase. NHIs play a crucial role in cloud computing, powering critical applications and efficient operations by enabling digital identities to gain the cloud access and permissions they need.
Will 2025 See a Rise of NHI Attacks?
The flurry of non-human identity attacks at the end of 2024 demonstrates extremely strong momentum heading into the new year. That does not bode well.
|
|||
Worth Knowing
Cloud threat report: Why have SaaS platforms on dark web marketplaces decreased?
IBM’s X-Force team recently released the latest edition of the Cloud Threat Landscape Report for 2024, providing a comprehensive outlook on the rise of cloud infrastructure adoption and its associated risks.
World Tour Survey: Cloud Engineers Wrestle with Risk
Trend surveyed 750 cybersecurity professionals in 49 countries to learn more about the state of cybersecurity, from job pressures to the need for more advanced tools. Explore what cloud security engineers teams had to say.
Report: Compliance, security challenges persist in cloud adoption
Fortinet's 2025 State of Cloud Security Report highlighted persistent challenges in cloud adoption, particularly around security and compliance, according to Channel Futures.
|
|||
Competitive Information
Proactively Secure Kubernetes Workloads with Upwind’s Runtime-Powered KSPM
With the rise of containerized environments and Kubernetes adoption, Kubernetes security posture management (KSPM) has risen to the forefront of cloud security posture initiates. KSPM generally requires the use of security tools or processes to help ensure the security of Kubernetes clusters, with most focusing on policies and configurations.
Easily Query Kubernetes Objects with Upwind’s Runtime Topology Map
We’re excited to introduce a powerful new container security capability that makes it easier than ever to view and query Kubernetes objects while exploring the entire exposure path with Upwind’s runtime topology map.
Sweet Security launches LLM-powered cloud detection engine
The new capability also makes it easier to detect zero-day threats and certain otherwise undetectable malicious activities. The engine analyzes cloud variables with greater precision, thus reducing cloud detection noise to just 0.04% without the need to first define normal cloud behavior, said Sweet Security Chief Product Officer Eyal Fisher.
|