Date: 19/05/2022
Microsoft Azure: Five Best Practices for Cloud Security
Cloud security is a fundamentally new landscape for many companies. While many security principles remain the same as on-premises, the implementation is often very different. This overview provides a snapshot of five best practices for cloud security: identity and access management, security posture management, apps and data security, threat protection and network security. 1. Strengthen […]
Read more
Date: 21/02/2017
The cloud is growing 7 times faster than the rest of IT
NETWORK WORLD, 21 February, 2017 – The public cloud just keeps on growing, with increases in spending on cloud services and infrastructure easily outpacing overall IT spending. And it isn’t even close. The latest update to International Data Corporation’s Worldwide Semiannual Public Cloud Services Spending Guide projects worldwide investments in the public cloud “will reach […]
Read more
Date: 02/02/2023
Attacks against governments jumped 95% in last half of 2022
Attacks against governments jumped 95% in last half of 2022 The number of attacks targeting the government sector increased by 95 per cent in the second half of 2022, a new report has found. The report by AI-based cyber security vendor CloudSek found India, the US, Indonesia, and China accounted for 40 per cent of […]
Read more
Date: 07/12/2022
Last Pass Suffers Second Data Breach in 5 Months
LastPass suffers second data breach in 5 months Password management app Last Pass has announced hackers have breached its cloud storage containing customer data. This is the second time the company has been targeted in five months, after a similar breach in August. Cyber attackers gained access to the company’s developer environment using a hacked […]
Read more
Date: 25/03/2022
Okta breach leads to questions on disclosure, and our reliance on third party vendors
Okta breach leads to questions on disclosure, reliance on third-party vendors – CyberScoop In another supply chain attack, The Lapsus$ hacker group has targeted Microsoft and Okta in recent breaches confirmed by both technology organizations. Okta is an prominent identity and access management company based in San Francisco. It provides cloud software that helps companies […]
Read more
Date: 20/01/2022
How Microsoft Aligns and Matures Essential 8 Mitigation Strategies
The Essential Eight are a baseline set of security controls that been recommended by The Australian Cyber Security Centre to help mitigate malicious cyber activity for organisations. To help with the implementation of these controls, the Australian Signals Directorate (ASD) has defined an Essential Eight maturity model, detailing the different levels of maturity to help […]
Read more