Top Guns: Defending Corporate Clouds from Malicious Mavericks

Securing the slow but inevitable transition from traditional network and application infrastructures to the Cloud has long been a point of emphasis.
The COVID fueled acceleration of Cloud-first infrastructures, combined with tectonic shifts in the Cloud threat model and a substantial lack of cloud security specific talent, has us fighting next generation attackers, with last generation thinking.
Past the point of no return, research from Fortinet shows 39% of companies have more than half of their workloads in the cloud, and 58% plan to within the next 12-18 months.
While on premise infrastructure is well understood and monitored, in the cloud they've lost sight - literally and figuratively - of the vast differences between the assets they know, and those for which they have now ceded oversight to others.
Changes happen outside of enterprise purview by multiple entities, from business units to the cloud providers themselves.
Each time a cloud asset is added, removed, or changed - the organizational security posture is put at risk.
Most companies don't have clear insight into all the applications, systems, and data they are running in the cloud, and for more than 75% of companies, across multiple clouds.
While open buckets and misconfigurations get the most attention, they are only a fraction of the risks that security teams must account for, including sensitive data movement, access misuse/abuse, insecure interfaces/APIs, external sharing, hijacking, and malicious insiders.
The range of understanding about how best to assess security of cloud infrastructure and assets are as varied as the issues themselves.
Some put trust in the cloud provider controls, some apply on premise methodologies and concepts in a range of new tools and services.
The most forward-looking organizations are going beyond cloud asset and activity enumeration, to understanding how cloud assets can be compromised, and the paths to and between assets that represent real business risk.
The only real test of organizational cloud vulnerability is how it withstands an attack.
Much like applications and code, a corporate cloud can be subjected to a penetration test.
This involves simulating an attack on a cloud environment via a compromised asset and/or conducting manual penetration tests based on specific objectives, not simply assets.
While important and a good way of determining the strength of individual asset compliance with security best practices, this approach fails to provide an accurate representation of how the controls will perform against real-world attacks or even account for all the risks facing cloud resources.
Infrastructure testing - Cloud Security Reviews provide strong inventories of assets, controls and configurations that may be sub-optimal and at risk of compromise.
Posture Review - examines optimal composition and coordination of overall cloud protections and best practices for securing cloud environments.
In contrast, Cloud penetration testing is about identifying exploitable findings and focusing on vulnerabilities that matter, to provide actionable recommendations and affect quantifiable improvement.
While applications and cloud infrastructure present different risk profiles and require different security assessments, they must not be viewed separately with regards to enterprise defense.
This continued expansion of business assets and operations in the Cloud highlight the need for a comprehensive view and approach, that acknowledges the singular focus and coordinated approach attackers will take to achieve their goal.


This Cyber News was published on www.securityweek.com. Publication date: Mon, 04 Dec 2023 17:14:55 +0000


Cyber News related to Top Guns: Defending Corporate Clouds from Malicious Mavericks

Multi-Cloud vs. Hybrid Cloud: The Main Difference - The proliferation of cloud technologies is particularly confusing to businesses new to cloud adoption, and they're sometimes baffled by the distinction between multi-cloud and hybrid cloud. Although the public cloud infrastructure and public cloud ...
6 months ago Techtarget.com
Latest Information Security and Hacking Incidents - Private cloud providers may be among the primary winners of today's generative AI gold rush, as CIOs are reconsidering private clouds, whether on-premises or hosted by a partner, after previously dismissing them in favour of public clouds. At the ...
1 month ago Cysecurity.news
Top Guns: Defending Corporate Clouds from Malicious Mavericks - Securing the slow but inevitable transition from traditional network and application infrastructures to the Cloud has long been a point of emphasis. The COVID fueled acceleration of Cloud-first infrastructures, combined with tectonic shifts in the ...
6 months ago Securityweek.com
A Comprehensive Guide to Penetration Testing in Public Clouds - As organizations increasingly migrate their operations to public cloud environments, the need for robust security measures has never been more critical. Cloud penetration testing emerges as a crucial component in ensuring the integrity and resilience ...
5 months ago Cybersecurity-insiders.com
Overcoming Multi-Cloud Security Challenges: The Power of a Unified Configuration of Clouds - Be it manufacturers, financial institutions, global giants in media and entertainment, or healthcare organizations - many businesses of medium and large caliber find the need to harness two or more clouds. Using multiple clouds helps them enhance ...
5 months ago Cyberdefensemagazine.com
Surge of swatting attacks targets corporate executives and board members - At around 8:45 pm on February 1, 2023, a caller to the Groveland, Massachusetts, 911 emergency line told dispatchers that he harmed someone in a home on Marjorie Street in the upscale small town 34 miles north of Boston. The caller also said he would ...
1 year ago Csoonline.com
CVE-2015-2165 - Multiple cross-site scripting (XSS) vulnerabilities in the Report Viewer in Ericsson Drutt Mobile Service Delivery Platform (MSDP) 4.x, 5.x, and 6.x allow remote attackers to inject arbitrary web script or HTML via the (1) portal, (2) fromDate, (3) ...
5 years ago
Top 42 Cybersecurity Companies You Need to Know - As the demand for robust security defense grows, the market for cybersecurity technology has exploded, as have the number of available solutions. To help you navigate this growing market, we provide our recommendations for the world's leading ...
7 months ago Esecurityplanet.com
Ongoing Azure Compromises Target Senior Execs, Microsoft 365 Apps - Dozens of environments and hundreds of individual user accounts have already been compromised in an ongoing campaign targeting Microsoft Azure corporate clouds. The activity is in some ways scattershot - involving data exfiltration, financial fraud, ...
4 months ago Darkreading.com
Research Shows 163% ROI with Palo Alto Networks Software Firewalls - Good news is here for cloud and network security professionals who need proven, cost-effective solutions that substantially reduce downtime and breaches across a range of cloud and virtualized environments. Palo Alto Networks software firewalls not ...
6 months ago Paloaltonetworks.com
Integration of Cisco Secure Threat Defense Virtual with Megaport - Business critical data can originate from diverse sources ranging from multiple public clouds, private clouds, and internal servers to a remote employee's device. Securing each data entity individually is time consuming and challenging due to lack of ...
1 month ago Feedpress.me
CISA orders agencies impacted by Microsoft hack to mitigate risks - CISA has issued a new emergency directive ordering U.S. federal agencies to address risks resulting from the breach of multiple Microsoft corporate email accounts by the Russian APT29 hacking group. It requires them to investigate potentially ...
2 months ago Bleepingcomputer.com
Council Gives Green Light to Europe's Corporate Sustainability Due Diligence Directive - For most businesses, corporate responsibility has evolved from a peripheral concern to a core consideration. Today, with the Council's vote on the European Union Corporate Sustainability Due Diligence Directive, the EU took a significant step toward ...
3 months ago Feedpress.me
Gaining Insights on the Top Security Conferences - A Guide for CSOs - Are you a CSO looking for the best security events around the world? Well, you have come to the right place! This article is a guide to the top security conferences that offer essential security insights to help make informed decisions. Security ...
1 year ago Csoonline.com
What to do if your company was mentioned on Darknet? - Every year is abundant with major data leaks, biggest data breaches and hacks drawing massive media attention. While the darknet does facilitate the sale of diverse data types, for example, bank card information, driver licenses and ID photos, etc. ...
6 months ago Securelist.com
Corporate Spy Tech and Inequality: 2023 Year in Review - Our personal data and the ways private companies harvest and monetize it plays an increasingly powerful role in modern life. Throughout 2023, corporations have continued to collect our personal data, sell it to governments, use it to reach inferences ...
6 months ago Eff.org
CISA Warns of Compromised Microsoft Accounts - CISA issued a fresh CISA emergency directive in early April instructing U.S. federal agencies to mitigate risks stemming from the breach of numerous Microsoft corporate email accounts by the Russian APT29 hacking group. The directive is known as ...
2 months ago Securityboulevard.com
8 Hybrid Cloud Security Challenges and How to Manage Them - Business transitions, incompatible technology environments and rapid changes in dynamic public cloud services can cause hybrid cloud security challenges. Single hybrid cloud is now multiple clouds, said Mark Buckwell, executive cloud security ...
5 months ago Techtarget.com
Key Events of 2023 for NSFOCUS WAF - Let's take a look at the key events of NSFOCUS WAF in 2023. June 2023: NSFOCUS Tops China's Hardware WAF Market for Four Consecutive Years in IDC market share research report on China's hardware WAF market share;. Effective supervision and compliance ...
5 months ago Securityboulevard.com
Amazon Wins $274m Tax Battle With EU - Defeat for European Commission after court rules Amazon does not have to pay 250m euros in back taxes to Luxembourg. The European Commission and EU antitrust chief Margrethe Vestager have been handed a defeat in their attempts to crack down on ...
6 months ago Silicon.co.uk
China-Sponsored Attackers Target 40K Corporate Users in 90 Days - Three novel credential-phishing campaigns have emerged from state-sponsored actors that have compromised at least 40,000 corporate users - including top-level executives - in just three months' time, researchers have found. The attacks target a range ...
3 days ago Darkreading.com
Law Enforcement in Europe Detains 42 People Following Discovery of Secretive App - European police have made a major breakthrough in their fight against crime, arresting 42 suspects and seizing guns, drugs and millions in cash. The investigation began in September 2020 and led to the shutdown of the Exclu Messenger service, an ...
1 year ago Securityweek.com
The Top 24 Security Predictions for 2024 - For 2024, top topics range from upcoming elections to regional wars to space exploration to advances in AI. And with technology playing a more central role in every area of life, annual cybersecurity prediction reports, cyber industry forecasts and ...
6 months ago Securityboulevard.com
The Top 24 Security Predictions for 2024 - Welcome to the second installment of this comprehensive annual look at global cybersecurity industry predictions from the top security industry vendors, technology magazines, expert thought leaders and many more. Last week, in part one of The Top 24 ...
6 months ago Securityboulevard.com
Elevate Your Security: Meet Modern Attacks With Advanced CSPM - Recent surges in cloud attacks and breaches have given attention to how teams should efficiently protect and run applications in the cloud. This is especially true as misconfigurations top the list of security threats in cloud environments and are ...
6 months ago Securityboulevard.com

Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)