Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Omer_Shliva
Employee
Employee

Last Week in Cloud Security January 23 2025

Check Point Securing the Cloud

 

How Grand Canyon Education Enhanced Their Cloud Security with CloudGuard

 

Educational institutions face unique challenges in maintaining robust cloud security. Grand Canyon Education (GCE) is a shared services partner dedicated to serving colleges and universities. GCE supports partner institutions’ students through operational functions that achieve organizational growth and student success.

 

READ MORE

 

 

Vulnerabilities and Case Studies

 

How to Eliminate Identity-Based Threats

 

Despite significant investments in advanced technologies and employee training programs, credential and user-based attacks remain alarmingly prevalent, accounting for 50-80% of enterprise breaches[1],[2]. While identity-based attacks continue to dominate as the leading cause of security incidents, the common approach to identity security threats is still threat reduction, implementing layers of controls to reduce risk while accepting that some attacks will succeed. This methodology relies on detection, response, and recovery capabilities to minimize damage after a breach has already occurred, but it does not prevent the possibility of successful attacks.

 

READ MORE

 

 

Non-Human Identities

 

OWASP Non-Human Identities Top 10:Forging a New Standard in Cloud Security

 

According to an analysis by the Orca Research Pod, non-human identities (NHIs) outnumber their human counterparts by an average of 50:1. With a rise in automated processes and AI services in the cloud, the number of NHIs continues to rapidly increase. NHIs play a crucial role in cloud computing, powering critical applications and efficient operations by enabling digital identities to gain the cloud access and permissions they need.

 

READ MORE

 

 

Will 2025 See a Rise of NHI Attacks?

 

The flurry of non-human identity attacks at the end of 2024 demonstrates extremely strong momentum heading into the new year. That does not bode well.

 

READ MORE

 

 

Worth Knowing

 

Cloud threat report: Why have SaaS platforms on dark web marketplaces decreased?

 

IBM’s X-Force team recently released the latest edition of the Cloud Threat Landscape Report for 2024, providing a comprehensive outlook on the rise of cloud infrastructure adoption and its associated risks.

 

READ MORE

 

 

World Tour Survey: Cloud Engineers Wrestle with Risk

 

Trend surveyed 750 cybersecurity professionals in 49 countries to learn more about the state of cybersecurity, from job pressures to the need for more advanced tools. Explore what cloud security engineers teams had to say.

 

READ MORE

 

 

Report: Compliance, security challenges persist in cloud adoption

 

Fortinet's 2025 State of Cloud Security Report highlighted persistent challenges in cloud adoption, particularly around security and compliance, according to Channel Futures.

 

READ MORE

 

 

Competitive Information

 

Proactively Secure Kubernetes Workloads with Upwind’s Runtime-Powered KSPM

 

With the rise of containerized environments and Kubernetes adoption, Kubernetes security posture management (KSPM) has risen to the forefront of cloud security posture initiates. KSPM generally requires the use of security tools or processes to help ensure the security of Kubernetes clusters, with most focusing on policies and configurations.

 

READ MORE

 

 

Easily Query Kubernetes Objects with Upwind’s Runtime Topology Map

 

We’re excited to introduce a powerful new container security capability that makes it easier than ever to view and query Kubernetes objects while exploring the entire exposure path with Upwind’s runtime topology map.

 

READ MORE

 

 

Sweet Security launches LLM-powered cloud detection engine

 

The new capability also makes it easier to detect zero-day threats and certain otherwise undetectable malicious activities. The engine analyzes cloud variables with greater precision, thus reducing cloud detection noise to just 0.04% without the need to first define normal cloud behavior, said Sweet Security Chief Product Officer Eyal Fisher.

 

READ MORE

0 Kudos
0 Replies

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.