Hardening the security of your AWS Elastic Beanstalk Application the Well-Architected way

Source

Launching an application in AWS Elastic Beanstalk is straightforward. You define a name for your application, select the platform you want to run it on (for example, Ruby), and upload the source code. The default Elastic Beanstalk configuration is intended to be a starting point which prioritizes simplicity and ease of setup. This allows you to quickly [...]

Canada Charges Its “Most Prolific Cybercriminal”

Source

A 31-year-old Canadian man has been arrested and charged with fraud in connection with numerous ransomware attacks against businesses, government agencies and private citizens throughout Canada and the United States. Canadian authorities describe him as “the most prolific cybercriminal we’ve identified in Canada,” but so far they’ve …

Using CloudTrail to identify unexpected behaviors in individual workloads

Source

In this post, we describe a practical approach that you can use to detect anomalous behaviors within Amazon Web Services (AWS) cloud workloads by using behavioral analysis techniques that can be used to augment existing threat detection solutions. Anomaly detection is an advanced threat detection technique that should be …

New German Government is Pro-Encryption and Anti-Backdoors

Source

I hope this is true: According to Jens Zimmermann, the German coalition negotiations had made it “quite clear” that the incoming government of the Social Democrats (SPD), the Greens and the business-friendly liberal FDP would reject “the weakening of encryption, which is being attempted under the guise of the …

Cloud IDS for network-based threat detection is now generally available

Source

As more and more applications move to the cloud, cloud network security teams have to keep them secure against an ever-evolving threat landscape. Shielding applications against network threats is also one of the most important criteria for regulatory compliance. For example, effective intrusion detection is a requirement of the …

How MEDITECH adds advanced security to its cloud-based healthcare solutions with Cloud IDS

Source

MEDITECH develops electronic health record (EHR) systems solutions that enhance the interactions of physicians and clinicians with patients. The company empowers healthcare organizations large and small to deliver secure, cost-effective patient care. MEDITECH's intuitive and mobile offerings include software for health information management, patient care and patient safety, emergency …

How Vuclip safeguards its cloud environment across 100+ projects with Security Command Center

Source

Entertainment has never been more accessible. As our phones are now an inextricable part of our lives, there’s an increasing appetite for mobile video content, and that is what Vuclip delivers. Vuclip is a leading video-on-demand service for mobile devices with more than 41 million monthly active users …

Foreign Office IT chaos: Shocking testimony reveals poor tech support hindered Afghan evac attempts

Source

Contributed to dysfunction as diplomats and soldiers struggled to get Afghan helpers out of reach of Taliban Diplomats and soldiers were left grappling with appallingly inadequate IT and secure communications support as thousands of Afghans struggled to get help from the UK during the fall of the capital Kabul …

page 1 | older articles »