Cloud security

Biometrics in the Cloud

Introduction Many of us have heard about the Cloud, and even use it.  It’s obviously a rather simple process, you sign up for an account, you get a user name

Open-Source Intelligence Collection in Cloud Platforms

Threat Intelligence One of the most popular specialized fields within the security domain is threat intelligence. In the recent years, organizations have bee

How to Safeguard Against the Privacy Implications of Cloud Computing

Introduction The definition of cloud computing is quite controversial but the general consensus, good enough for our purposes, is that it is really just a me

AWS Cloud Security for Beginners — Part 2

Introduction In the previous part of this series, we set up our free-tier account and then configured AWS CLI. In this article, we will discuss S3 buckets an

AWS Cloud Security for Beginners — Part 1

Introduction to AWS cloud security Cloud computing has gained enormous attention during the past few years, and a lot of companies are shifting their infrast

AWS Security Monitoring Checklist — Part 2

In Part One, we covered some important security configurations checklists relating to AWS objects such as S3, IAM and Cloudtrail. In this installment, we wil

Rise of the Rogue Cloud: The Fundamental Security Mistake Enterprises Make and How to Correct It

Development teams, especially at the world's largest organizations, move at a lightning pace. Not just to keep their businesses competitive, but also to keep

Controlling the Risks of Cloud-Enabled End-Point Security Products

Cloud Connectivity for End-point Security Products A relatively new feature in Antivirus products has led to an evolution of most traditional Antivirus produ

The Ultimate Guide to CCSP Certification

If you work in the IT field, you’re obviously familiar with the cloud. What was once a bit of a novelty has now become commonplace, meaning every company and

Five Reasons Why Security Professionals Need the Cloud

Malware Analysis A more experienced security analyst or a threat intelligence analyst should be comfortable with malware research and even reverse engineerin