AWS
IOTW: Turkish-based airline leaves 6.5 TB of sensitive data exposed
June 01 by Beth MaundrillAn AWS S3 bucket containing Pegasus Airlines’ Electronic Flight Bag information left unprotected
Why IT leaders Should Consider A Zero Trust Network Access Strategy
October 12 by Seth AdlerCompanies are leveraging the explosion of public cloud solutions to optimize business processes and deliver products and services more quickly and at a lower overall cost.
Cloud Security: A CISO Guide
September 30 by Jeff OrrEnterprises are migrating to the cloud, taking their data and applications to this platform. However, the cyber security risks are often overlooked. This Cyber Security Hub Guide provides insight from...
Behind The Data Breach: Understanding Cloud Security And Misconfigurations
September 17 by Dennis E. Leber, Ph.D.Many breaches occurring today are applications that reside in the cloud and often explained as a misconfiguration on the customer side. Hosting the right internal discussions and having the proper con...
Moving To The Cloud: Considerations Beyond The Bottom Line
August 12 by Dennis E. Leber, Ph.D.Organizations are rapidly moving to cloud providers to reduce costs, pursue digital transformation initiatives, and improve the agility of business. Moving to the cloud transfers cyber risks in many a...
IOTW: Historic Capital One hack reaches 100 million customers affected by breach
August 02 by Kayla MatthewsA closer look at what happened in the Capital One mega-breach, the kinds of data compromised, and the financial services organization’s response in the CShub Incident Of The Week.
Quantifying The Enterprise Cost Of A Cyber Security Data Breach
July 30 by Jeff OrrNo industry sector can claim immunity from data breaches. The impact to an organization goes well beyond the actual incident. New data from actual incidents around the world suggests the estimated cos...
Cloud Security Market Report: Exploring The Right Enterprise Strategy
July 29 by Jeff OrrThis Cyber Security Hub market report examines the ins and outs of today’s hybrid cloud setups so enterprises can better understand the technology and vulnerabilities, in order to develop the right cl...
Is The Cyber Security Industry In A Bubble?
April 25 by Alarice RajagopalThe Founder and Managing Partner of Boldstart, Ed Sim joined Host George Rettas, president and CEO of Task Force 7 Radio and Task Force 7 Technologies, and Co-host Tom Pageler Chief Security Officer o...
Cyber Security Cross Over: What To Expect When Making That Transition
April 10 by Katia DeanAre you a person who is interested in this subject area, obtained a degree or possibly obtained various credentials? Are you still lost on what path to go down or wondering why these positions are sti...