Misconfiguration
Hacker Report 2021
July 05 by Seth AdlerDownload this report to realize: What motivates hackers to hack? What technologies are hackers working on? Which industries are hackers working with?
2020 Top Breaches: Part II
December 23 by Seth AdlerThe pandemic has been a breeding ground for quick cyber wins around the healthcare industry, the distribution of government money and the education space due to collaboration platforms.
2020 Top Breaches: Part I
December 22 by Seth AdlerIf you can truly remember what life was like pre-pandemic in Q1, 2020- you're in the minority. Our lives have all changed. And the cyber security discipline is completely different. We've gone from an...
You Are The Weakest Link
July 09 by Seth AdlerIt is not the systems that ultimately fail cyber security professionals- it's the people. Insider threats do abound but more often than malfeasance being a driver, misfeasance is the key to a breach....
Incident Of The Week: Misconfigured Servers Result In 250 Million Microsoft Customer Support Records Exposed
January 24 by Jeff OrrA misconfiguration applied to five Elasticsearch database servers in December 2019 led to the exposure of 250 million customer support records for software maker Microsoft. How should less sophisticat...
Cloud Security: A CISO Guide
September 30 by Jeff OrrEnterprises are migrating to the cloud, taking their data and applications to this platform. However, the cyber security risks are often overlooked. This Cyber Security Hub Guide provides insight from...
Incident Of The Week: Cloud Misconfiguration Exposes 20 Million Ecuador Citizen Records
September 20 by Jeff OrrEnterprises are not the only entities that can experience cloud misconfigurations. In this Incident Of The Week, detailed family, financial and vehicle information of Ecuador’s citizens was discovered...
Behind The Data Breach: Understanding Cloud Security And Misconfigurations
September 17 by Dennis E. Leber, Ph.D.Many breaches occurring today are applications that reside in the cloud and often explained as a misconfiguration on the customer side. Hosting the right internal discussions and having the proper con...