article thumbnail

More than one-third of cloud environments are critically exposed, says Tenable

Network World

In the first half of this year, 38% of organizations had at least one cloud workload that was critically vulnerable, highly privileged, and publicly exposed, according to a study of telemetry from customers of cloud security vendor Tenable released this week. The cloud is a tool like any other; how you use it is what matters,” he said.

Cloud 505
article thumbnail

Predictable AWS cloud deployment resources allow full account takeover

Network World

Amazon Web Services (AWS) is urging its open-source Cloud Development Kit (CDK) users to apply fixes now available for a flaw that, under certain circumstances, can allow complete account takeover.

Resources 433
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Talent gap complicates cost-conscious cloud planning

Network World

Enterprises know everything is not moving to the cloud that was the lesson of 2024, and it triggered some extreme reactions that fueled the cloud repatriation stories we all heard. Its that some things are, and should be, moving to the cloud. The top strategy so far is what one enterprise calls the Cloud Team.

Cloud 374
article thumbnail

AWS tries to lure users to its cloud via storage ease of use

Network World

At its re:Invent 2024 conference this week, AWS rolled out five new storage tools and services with the goal of making its offerings easier to work with, if not cheaper or better. With the incremental differences in the major enterprise cloud environments today, that may be enough. Is it vendor lock-in or a trusted partnership?

Storage 418
article thumbnail

Fortinet partners with Amazon Web Services to secure enterprise workloads on AWS

CTOvision

Cybersecurity firm Fortinet announced a new integration with Amazon Web Services (AWS) to provide common customers with advanced security across their cloud platforms, applications, and network. Fortinet’s cloud security solutions […].

article thumbnail

How business email compromise attacks emulate legitimate web services to lure clicks

Tech Republic Security

The post How business email compromise attacks emulate legitimate web services to lure clicks appeared first on TechRepublic. New BEC cyberattacks use phishing with a legitimate Dropbox link as a lure for malware and credentials theft.

article thumbnail

SolarWinds launches incident response tool, boosts AI in observability platform

Network World

The company also bolstered its SolarWinds Observability product with new integrations and support for cloud environments, including Google Cloud Platform (GCP), Amazon Web Services (AWS), and Microsoft Azure.

Tools 334