Information Security Buzz
  • HOME
  • Data Breach
  • Malware
  • Application Security
  • IoT
  • Cloud Security
  • Privacy
  • Register
  • Log In
Top Posts
Expert On Facebook Introduces Whatsapp Carts
Expert Insight On Ransomware Forces Hosting Provider Netgain...
Police Warn Shared Power Banks Could Transmit Malware...
Expert Reaction On Cybercrime Cost The World Economy...
Research: Fewer Than 10% Of Security Professionals Feel...
Cyberattack On Package Delivery Lockers In Moscow
Expert Comments On Encrypted Messaging Puts Children At...
Expert Insight On Amnesia:33 Vulnerabilities Impact Millions Of...
Expert On News: Hackers Appear To Begin Selling...
Experts On Major Security Flaw Found In Android...
Information Security Buzz

Connecting Security Experts

  • HOME
  • Data Breach
  • Malware
  • Application Security
  • IoT
  • Cloud Security
  • Privacy
  • Register
  • Log In
Search results for

"cloud security"

Security Articles

Getting Cloud Right: The 4 Crucial Aspects Of Cloud Security

Expert(s): Robert Smith September 14, 2020
by: Robert Smith

Cloud is not an emerging trend anymore. It is a mature business model for IT organizations to stay competitive in today’s challenging digital landscape.

Cloud is not only redefining the IT landscape but also how security measures are developed and deployed.
The migration to the cloud has forced organizations to rethink security and privacy from scratch.

Approaches to robust security in the cloud are quite different from those in an on-premise IT environment. As a result, your current security expertise may not be entirely relevant to your new, cloud-based environment.

So, before moving mission-critical assets to the cloud, organizations don’t need just security but robust security that they can trust and monitor.

Here are four essential aspects that help develop robust cloud security, so that your migration to the cloud lives up to its full commercial and strategic promise.

The 4 Crucial Aspects of Cloud Security

1. Data Security

As data moves from a company’s secure perimeter to the cloud, organizations must move to a layered model that ensures the proper isolation of data in the shared, multitenant cloud. The data must be encrypted using methodologies such as cryptography and tokenization and secured by controls like multi-factor authentication and digital certificates.

Monitoring tools must also be deployed to reinforce security tools such as intrusion detection, Denial-of-Service (Dos) attack monitoring, and network traceability tools.

It’s imperative for organizations to stay abreast and adopt security innovations to gain complete visibility of their data and information.

2. Compute-level Security

Organizations must employ compute-level security for end systems, managed services, and various workloads and applications in the cloud environment.

The first component of compute-based security is automated vulnerability management, which involves identifying and preventing security loopholes across the entire application lifecycle.

The second component is providing operational security for anything considered to be a compute system or compute workload.

Robust cloud security requires automatic and continuous inspection and monitoring for detecting any anomalous or malicious activity.

3. Network Security

Securing networks in the cloud is different from securing a traditional network. Network security in cloud computing involves four principles:

a) Micro segmentation or isolation of zones, workloads, and applications using layers of firewall

b) Network controls for traffic flow down to the user level

c) Applications should use end-to-end transport-level encryption

d) Using encapsulation protocols such as SSH, IPSEC, SSL while deploying a virtual private cloud

In addition to these principles, organizations must deploy Network Performance Management (NPM) tools to gain access to monitor network performance and ensure that the cloud service provider is on par with the Service Level Agreements (SLA).

4. Identity Security

A robust Identity and Access Management strategy is essential for a successful migration to the cloud as it provides a cost-effective, agile, and highly flexible integrated access solution.

IAM security framework comprises of five domains of identification, authentication, authorization, access governance, and accountability.

It allows IT administrators to authorize who can access specific resources, giving the organization full control and visibility to manage cloud resources centrally.

In Conclusion:

These four pillars are essential for developing comprehensive cloud security. However, it’s crucial for organizations to understand their cloud provider’s security architecture in terms of firewalls, intrusion detection techniques, and industry standards and certifications. This helps the organization align its own security architecture with the Cloud Service Provider’s (CSPs) architecture constraints.

Moreover, organizations must provide training to the employees and create awareness of the security risks associated with cloud migration. Developing a culture of constant vigilance is one of the easiest and most cost-effective approaches for securing cloud data.

September 14, 2020 0 response
0 FacebookTwitterLinkedinWhatsappEmail
Expert Comments

Cloud Security Expert Re: Enterprise Cloud Giant Cloudera Leaks Private Credentials Through Public Storage Buckets

Expert(s): Security Experts August 26, 2020
by: Security Experts

UpGuard researchers found sensitive internal files inside several Cloudera cloud storage buckets, causing Cloudera to pull the cloud storage servers offline, despite initially claiming the servers were “open by design.”

UpGuard discovered multiple misconfigured AWS cloud storage buckets under the control of Hortonworks, an enterprise data processing company which completed a merger with Cloudera in January of 2019. Amidst terabytes of intentionally public files, however, were numerous system credentials and other internal developer information. UpGuard concluded that when so many directories and files of varying format are stashed away together, it becomes all too easy for something to be mistakenly put among them and remain unnoticed.

Experts Comments

Dot Your Expert Comments
Pravin Kothari
August 26, 2020
CEO
CipherCloud
Almost daily there is a new report on an organization that has lost control of their data through innocuous means such as public sharing.
Many organizations do not have visibility into what their users are storing or moving into cloud applications. The reality is that properly maintaining cloud security is a complex and multi-tiered set of requirements. Even the best practitioners will remain challenged to cover all the bases on a continuous basis; these issues most frequently revolve around a lack of visibility into faulty controls.....Read More
Many organizations do not have visibility into what their users are storing or moving into cloud applications. The reality is that properly maintaining cloud security is a complex and multi-tiered set of requirements. Even the best practitioners will remain challenged to cover all the bases on a continuous basis; these issues most frequently revolve around a lack of visibility into faulty controls, not a lack of effort. In addition to leveraging solutions such as DLP to determine data compliance, security managers must be able to find and eliminate inadvertent public data shares. Almost daily there is a new report on an organization that has lost control of their data through innocuous means such as public sharing.   Read Less
Like(1)

Linkedin Message

@Pravin Kothari, CEO, provides expert commentary for "dot your expert comments" at @Information Security Buzz:
Cloud Security Expert Re: Enterprise Cloud Giant Cloudera Leaks Private Credentials Through Public Storage Buckets.
"Almost daily there is a new report on an organization that has lost control of their data through innocuous means such as public sharing. ..."
https://www.informationsecuritybuzz.com/expert-comments/cloud-security-expert-re-enterprise-cloud-giant-cloudera-leaks-private-credentials-through-public-storage-buckets
#infosec #cybersecurity #isdots

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Pravin Kothari, CEO, provides expert commentary for "dot your expert comments" at @Information Security Buzz:
Cloud Security Expert Re: Enterprise Cloud Giant Cloudera Leaks Private Credentials Through Public Storage Buckets.
"Almost daily there is a new report on an organization that has lost control of their data through innocuous means such as public sharing. ..."
https://www.informationsecuritybuzz.com/expert-comments/cloud-security-expert-re-enterprise-cloud-giant-cloudera-leaks-private-credentials-through-public-storage-buckets
#infosec #cybersecurity #isdots

Copy this message and share on your Facebook profile. Thanks!

Dot Your Expert Comments


Only for registered and approved experts. Please register before providing comments. Register here
* By using this form you agree with the storage and handling of your data by this web site.
Submit
Thank you, your comments have been submitted for review.
August 26, 2020 0 response
0 FacebookTwitterLinkedinWhatsappEmail
Expert Comments

What expert says on survey on the implementation of cloud security best practices

Expert(s): Security Experts August 13, 2020
by: Security Experts

Tripwire has today released the results of a survey on the implementation of cloud security best practices. Conducted by Dimensional Research last month, the survey evaluated the opinions of 310 security professionals. According to the survey, a number of organizations face shortcomings in monitoring and securing their cloud environments. A majority of security professionals (76%) state they have difficulty maintaining security configurations in the cloud, and 37% said their risk management capabilities in the cloud are worse compared with other parts of their environment. Almost all (93%) are concerned about human error causing accidental exposure of their cloud data. Attackers are known to run automated searches to find sensitive data exposed in the cloud, making it critical for organizations to monitor their cloud security posture on a recurring basis and fix issues immediately. However, Tripwire’s report found that only 21% of organizations assess their overall cloud security posture in real-time or near real-time. While 21% said they conduct weekly evaluations, 58% do so only monthly or less frequently. Despite widespread worry about human errors, 22% still assess their cloud security posture manually.

More information: https://www.tripwire.com/state-of-security/featured/survey-security-configs-cloud/

Experts Comments

Dot Your Expert Comments
Niamh Vianney Muldoon
August 13, 2020
Senior Director of Trust and Security, EMEA
OneLogin
Hard tokens, biometrics, or one-time passwords prevent 99.9% of account takeovers.
It is interesting to note the disconnect between the concerns of security professionals, be it towards human error causing accidental exposure of data or their difficulty in maintaining security configurations, and the lack of measures put in place to resolve such issues. Cybersecurity concerns should be seen as a priority within an organisation, and should be a regular conversation topic at board.....Read More
It is interesting to note the disconnect between the concerns of security professionals, be it towards human error causing accidental exposure of data or their difficulty in maintaining security configurations, and the lack of measures put in place to resolve such issues. Cybersecurity concerns should be seen as a priority within an organisation, and should be a regular conversation topic at board meetings. Conducting regular, automatic audits to assess an organisation’s cloud security posture and patch vulnerabilities is fundamental to reducing the risk of an attack, as is the implementation of MFA. Indeed, hard tokens, biometrics, or one-time passwords prevent 99.9% of account takeovers.  Read Less
Like(1)

Linkedin Message

@Niamh Vianney Muldoon, Senior Director of Trust and Security, EMEA, provides expert commentary for "dot your expert comments" at @Information Security Buzz:
What expert says on survey on the implementation of cloud security best practices.
"Hard tokens, biometrics, or one-time passwords prevent 99.9% of account takeovers...."
https://www.informationsecuritybuzz.com/expert-comments/what-expert-says-on-survey-on-the-implementation-of-cloud-security-best-practices
#infosec #cybersecurity #isdots

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Niamh Vianney Muldoon, Senior Director of Trust and Security, EMEA, provides expert commentary for "dot your expert comments" at @Information Security Buzz:
What expert says on survey on the implementation of cloud security best practices.
"Hard tokens, biometrics, or one-time passwords prevent 99.9% of account takeovers...."
https://www.informationsecuritybuzz.com/expert-comments/what-expert-says-on-survey-on-the-implementation-of-cloud-security-best-practices
#infosec #cybersecurity #isdots

Copy this message and share on your Facebook profile. Thanks!

Dot Your Expert Comments


Only for registered and approved experts. Please register before providing comments. Register here
* By using this form you agree with the storage and handling of your data by this web site.
Submit
Thank you, your comments have been submitted for review.
August 13, 2020 0 response
0 FacebookTwitterLinkedinWhatsappEmail
News

Cloud Security Alliance Announces Availability Of Key Cloud Security Assessment And Guidance Documents In 10 Additional Languages

Expert(s): Cloud Security Alliance June 24, 2020
by: Cloud Security Alliance

Cloud Controls Matrix, Consensus Assessments Initiative Questionnaire, and PLA Code of Conduct for GDPR Compliance available to global audience

The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environment, announced today that three of its most popular assessment and guidance documents that ensure compliance with cloud security protocols are now, in the context of an agreement with OneTrust, available in 10 languages. TheCloud Controls Matrix, Consensus Assessments Initiative Questionnaire, and Privacy Level Agreement Code of Conduct for GDPR Compliance are now available in Spanish (ES), German (DE), French (FR), Italian (IT), Japanese (JA), Danish (DA), Dutch (NL), Portuguese (PT), Romanian (RO), and Swedish (SV).

“By expanding language formats, it’s our hope that these translations will facilitate the adoption of these valuable assets by even more organizations around the globe,” said Daniele Catteddu, Chief Technology Officer, Cloud Security Alliance. “As the cloud continues to grow in importance in today’s business landscape, the ability to ascertain which providers are mapping to security and compliance standards is an integral part of doing business. Moreover, the need to stay on the right side of privacy regulations are essential as enterprises continue to expand their business scope.”

About the frameworks:

  • Cloud Controls Matrix (CCM): A cybersecurity control framework for cloud computing, composed of 133 control objectives that are structured in 16 domains covering all key aspects of the cloud technology. It can be used as a tool for the systematic assessment of a cloud implementation, and provides guidance on which security controls should be implemented by which actor within the cloud supply chain. The controls framework is aligned to the Security Guidance v4 and is currently considered a de-facto standard for cloud security assurance and compliance.
  • Consensus Assessments Initiative Questionnaire (CAIQ): A companion to the CCM that provides a set of “yes or no” questions a cloud consumer or auditor may wish to ask a cloud provider. Based on the security controls in the CCM, the questions can be used to document which security controls exist in a provider’s IaaS, PaaS, and SaaS offerings. Over 500 organizations currently use the CAIQ to submit self-assessments on the STAR registry.
  • Privacy Level Agreement Code of Conduct for GDPR Compliance (PLA CoC): The PLA CoC provides a consistent and comprehensive framework for complying with the European General Data Protection Regulation (GDPR) and is designed to be an appendix to a Cloud Services Agreement to describe the level of privacy protection that a cloud service provider will provide.
June 24, 2020 0 response
0 FacebookTwitterLinkedinWhatsappEmail
Expert Comments

Major Data Leak Includes PII Of Employees From U.S.’s Top Aerospace And Defense Contractor – Commentary From Cloud Security Expert

Expert(s): Security Experts December 19, 2019
by: Security Experts

IMGE, consulting firm based in the Washington, D.C.-area left their Amazon cloud-storage system database that contained the names, phone numbers, home addresses, and email addresses of about 50,000 individuals—including more than 6,000 employees of the U.S.’s primary aerospace and defense contractor Boeing, publicly accessible online.

The Boeing employees impacted ranged from senior executives to program managers to government-relations personnel, and even one executive at the company’s advanced prototyping arm that handles highly classified work for the U.S. government.

Experts Comments

Dot Your Expert Comments
Chris DeRamus
December 19, 2019
VP of Technology Cloud Security Practice
Rapid7
Companies must adopt robust security strategies.
Leaving a database publicly accessible, unprotected without even a password, is a preventable yet common cause behind massive data leaks. Many users are not adequately familiar with the self-service nature of the cloud and may not implement proper cloud security settings and best practices, resulting in devastating data leaks, such as this incident. While the database has been removed from public .....Read More
Leaving a database publicly accessible, unprotected without even a password, is a preventable yet common cause behind massive data leaks. Many users are not adequately familiar with the self-service nature of the cloud and may not implement proper cloud security settings and best practices, resulting in devastating data leaks, such as this incident. While the database has been removed from public view, it is unclear how long the database was left open. Regardless, threat actors could have already accessed the personally identifiable information (PII) and traded the exposed information on dark web marketplaces. It is especially concerning that the database contained information about 6,000 Boeing employees, many of whom are heavily involved with the U.S. government and military, as the exposed data is more than enough information for cybercriminals to launch highly targeted attacks against those impacted to gain more confidential government information. Companies who manage large amounts of sensitive data, especially data related to government and military personnel, need to be proactive in ensuring their data is protected with proper security controls. Companies must adopt robust security strategies that are appropriate and effective in the cloud at the same time they adopt cloud services – not weeks, months, or years later. Automated cloud security solutions can detect misconfigurations, such as an unprotected database, in real time and trigger instant remediation, so that AWS buckets and other assets never have the opportunity to be exposed.  Read Less
Like(0)

Linkedin Message

@Chris DeRamus , VP of Technology Cloud Security Practice, provides expert commentary for "dot your expert comments" at @Information Security Buzz:
Major Data Leak Includes PII Of Employees From U.S.’s Top Aerospace And Defense Contractor – Commentary From Cloud Security Expert.
"Companies must adopt robust security strategies...."
https://www.informationsecuritybuzz.com/expert-comments/major-data-leak-includes-pii-of-employees-from-u-s-s-top-aerospace-and-defense-contractor-commentary-from-cloud-security-expert
#infosec #cybersecurity #isdots

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Chris DeRamus , VP of Technology Cloud Security Practice, provides expert commentary for "dot your expert comments" at @Information Security Buzz:
Major Data Leak Includes PII Of Employees From U.S.’s Top Aerospace And Defense Contractor – Commentary From Cloud Security Expert.
"Companies must adopt robust security strategies...."
https://www.informationsecuritybuzz.com/expert-comments/major-data-leak-includes-pii-of-employees-from-u-s-s-top-aerospace-and-defense-contractor-commentary-from-cloud-security-expert
#infosec #cybersecurity #isdots

Copy this message and share on your Facebook profile. Thanks!

Dot Your Expert Comments


Only for registered and approved experts. Please register before providing comments. Register here
* By using this form you agree with the storage and handling of your data by this web site.
Submit
Thank you, your comments have been submitted for review.
December 19, 2019 0 response
0 FacebookTwitterLinkedinWhatsappEmail
Study & Research

37% Of Organisations Have Suffered A Cyberattack On Cloud Environments Due To The Lack Of Basic Cloud Security Hygiene

Expert(s): Outpost24 August 22, 2019
by: Outpost24

New study reveals 42 percent of organisations are concerned about cloud security but many fail to carry out any security testing on the environment

With the recent exposure of a huge data breach affecting US bank Capital One, cloud security has once again been put under the spotlight. However, a recent survey from Outpost24 has revealed that many companies today would be unable to detect abnormalities in their cloud environment, while 37 percent have already experienced a cyberattack on their cloud systems. As more organisations embrace digital transformation and migrate to the cloud – the results of the survey highlight the lack of security hygiene when it comes to cloud environments.

The study, which was carried out at Infosecurity Europe in June 2019, studied the attitudes of 300 security professionals and also revealed that over a quarter (27 percent) of organisations do not know how quickly they could tell if their cloud data had been compromised, while 11 percent said a compromise on their on-premise data would be much quicker to detect, indicating some organisations are still relying solely on cloud service providers to protect their cloud data.

Other survey findings revealed that 42 percent of security professionals believe their on-premise data is more secure than their cloud hosted data, while 19 percent of organisations only carry out security testing on their cloud environment annually, and a staggering 11 percent never run any security testing at all.

“The cloud offers organisations huge benefits in terms of cost savings and scalability, however security in the environment should never be overlooked,” said Bob Egner, VP at Outpost24. “Organisations should treat their cloud assets just as they would their on-premise assets and apply all the same security principles of vulnerability and application security assessment, plus checks for cloud misconfigurations and security posture. It is extremely important to understand the shared responsibility model and what cloud service providers such as Amazon Web Services (AWS) and Microsoft Azure can and cannot offer in terms of security, as ultimately the responsibility of protecting your data and cloud workloads lies with you, the organisations using the cloud services.”

The study also asked respondents about how many of their products and applications are running in the cloud and 34 percent said more than half, while 15 percent said all their assets were running in the cloud.

“Our survey clearly shows that many organisations today are heavily reliant on the cloud, and often multi-cloud, which makes it difficult to apply and homogenise the correct security controls across multiple cloud service providers. Security testing should be continuous across the entire technology stack, including the cloud. Running automated and continuous testing is the best way to identify if cloud data is being accessed by anyone maliciously and to help spot any misconfigurations in real-time which could put the data at risk,” continued Egner.

August 22, 2019 0 response
0 FacebookTwitterLinkedinWhatsappEmail
Security Articles

The Next Generation Of Agnostic Cloud Security Delivered By cloudAshur

Expert(s): Professor John Walker June 4, 2019
by: Professor John Walker

The year is 2019, and I doubt anyone attending Infosecurity Show 2019 would challenge the statement ‘We live in times of Insecurity’. With a backdrop covering a spectrum of Cyber Attacks, by example, with Yahoo suffering a 3 billion record compromise back in 2013, through to the Marriott Hack circa 2014 – 2018 which exposed 500 million data assets and of course end-users. And not overlooking the Equifax debacle which exposed 145+ million customers. To top those numbers of insecurity off, consider the report made by the researcher Bob Diachenko who in May 2019 discovered an exposure associated with the Amazon AWS hosted Mongo DB database, which exposed no less than 275, 256,298 PII (Personally Identifiable Information)records of Indian Citizens – located by leverage of OSINT tools the likes of Shodan and other such freely available applications which may be employed by anyone with a moderate level of skill to discover, what are all too common Cloud insecurities leading to the acquisition and compromise of hosted golden nuggets of sensitive information assets.

When calculation is performed of the known security exposures and compromises, and then taking statistical input from the public knowns, and those unknowns that have not thus far been reported (and trust me, there are many) the numerical output is in the billions. However, what often gets overlooked with such compromises which expose PII is the forgotten potential of the Continuance of Criminal Abuse, and the illicit proffering and trading of such valuable information assets through open criminal markets, and the shady logical high-street outlets trading on the DarkWeb, which by inference gives extended life to such stolen and compromised data objects from say back in 2013 and beyond.

Based on historical facts, and my own personal research for articles and media and interviews on the BBC which have led to the discovery that there is a very high probability that end-users are not always made aware of the fact their data has been compromised, and that as such they are personally exposed through PII – for example, where the main compromised organisation is associated, supporting or hosted with other organisations who were impacted by the core hack or exposure. Or say like the WhatsApp security issue of May 2019, which was public, and yet many end users who are not blessed with being security savvy were completely unaware of the security implications, and the need to urgently update their applications – for these people their exposure continues.

Thus in a nutshell, be it a Personal User, SME (Small Medium Business) or a Corporate there is a ‘prima facie’ case for taking the dangers posed by cyber-attacks very seriously indeed, which dictates the utilisation of security platforms and tools which accommodate a robust protective layer to safeguard PII, and all other sensitive data assets – say your Bitcoin Wallet for example. In my personal case, and many others across the spectrum of data-owners, I utilise robust hand-held security platforms in the form of an iStorage encrypted drive, supporting such robust security. For example I put my trust in their FIPS 140-2 Level 3, NCSC CPA, NLNCSA BSPA and NATO Restricted Level diskAshur PRO² hosting onboard AES-XTS 256-bit hardware based encryption which may be used to secure NATO RESTRICTED Level data assets, as well as very adequate and trusted, worthy protection to remove the storage nightmare for GDPR tagged information assets. I also use the heavier desktop security solution provided by the diskAshur DT² which offers the same high-level security functionality of the diskAshur PRO², but in this case supports a storage capacity up to 14 TB of storage.  OK, so that takes care of all my in-hand security needs, but there are also occasions when I need to consider my own approach with transglobal activities when visiting far flung places, or for those occasions when on vacation where I didn’t have access to my secured drives – which is why I was so very excited to hear that iStorage were releasing their proven and excellent security capabilities into the world of Cloud to enable hardware secured, managed capabilities that will bridge the conversation gap when it comes to those two disparate conversational areas of ‘Cloud’ and ‘Security’ actually fitting into the same paragraph!

The Next Generation – cloudAshur

On the 17 May 2019 I was privileged to be given a personal sneak preview by iStorage CEO – John Michael, of what was being launched at Infosecurity 2019 in London on 4th June 2019. Like all conversations that consider the concept of any secure Cloud offering, I sat down at John’s desk with my what-if hat on – and then John, who was clearly excited with what he was about to show me (and, he was excited with just cause) pulled out of his draw a very robust Thumb Drive which was hosting a 12 Key pad (See Fig 1 below). This was the start of my introduction into their new iStorage Flagship product to secure the Cloud branded as cloudAshur – a product based on their proven hardware based hard drive systems, but in this case its application was cloud centric, and turns what are, potentially insecure Cloud environments into secure and manageable trusted storage facilities.

I was introduced to cloudAshur as the perfect solution for anyone wanting to securely store, share, manage and monitor data in the cloud, where cloudAshur is designed to eliminate the security vulnerabilities that exist with cloud platforms, such as lack of control and unauthorized access, and hackers using sophisticated methods to target innocent and vulnerable users.

Looking at the actual iStorage cloudAshur Module shown below at Fig 1. The first thing you notice about this FIPS Level 3 compliant tamper proof & evident waterproofed design, is the attention to detail and quality which has been applied to the build of the component. However, it goes well beyond aesthetics as this little device is supporting real-time military grade AES-XTS or AES-ECB 256-bit Hardware Encryption with the FIPS PUB 197 certified USB 3.0 encryption controller, all of which are encased within a super tough epoxy resin to mitigate the opportunity of tampering with the onboard security components, such as its EAL4+ ready secure microprocessor. Link all this to the other inbuilt security features by design with its dedicated hardware for protection against SPA (Simple Power Analysis), DPA (Digital Power Analysis), SEMA (Simple Electromagnetic Analysis) and DEMA (Differential Electromagnetic Analysis) attacks and a host of other features, and you start to get the message that a lot of security imagination has gone into this product during its three year development cycle. But for me the absolute bottom line is, with so many rich security features, this little security tool really does feel comfortable when sitting in the palm of the hand seeking to secure their Cloud based assets.

Fig 1 – The iStorage cloudAshur Module

The real beauty of the iStorage cloudAshur Module and associated service is, you enter the Next Generation of securing the Cloud with no less than five levels of robust, conjoined security – for example:

  • Something you Have – the Physical cloudAshur Module with the onboard Encryption Keys
  • Something you Know – the Complex Pin which gives Logical access to the Physical cloudAshur Module and its stored Encryption Keys
  • Something (else) you Know – The Login Credentials to the iStorage cloudAshur application
  • Something (else) you Know – the Cloud Provider Service of choice
  • Something (else) you Know – The Login Credentials for the associated Cloud Service

It could also go to another level of 6 for the very paranoid, with the additional use of a Something you Have in the form of say, a Physical Yubikey or DUO associated with a Cell Phone to give that extra level of paranoid assurance when using the common agnostic cloud.

Another great factor about this unique iStorage cloudAshur environment is, as I said, it is agnostic to the Cloud provider of choice – in other words, no matter the provider, the result is the same – secured data facilitated using Hardware Based Encryption to secure the remote data objects (the information) under the provisioned security of a robust algorithm to protect the selected personal, business or sensitive data asset.

What’s truly revolutionary about the cloudAshur is that aside from it being an ultra-secure PIN authenticated, hardware encrypted and collaborative cloud encryption module that encrypts all data in transit and at rest using a hardware-based AES-XTS 256-bit encryption key, it also comes with two applications which can help the user share and manage their data with others securely.

First up, we have the iStorage KeyWriter App (patent pending), which makes sharing of data in the cloud, via email and file transfer services (e.g. WeTransfer) between authorised users a breeze with ultimate security and peace of mind, allowing users to securely share data with one another, in real-time, regardless of their location. The iStorage KeyWriter copies all critical security parameters including the randomly generated encryption key and all PINs between the Master cloudAshur device and as many secondary cloudAshur devices as required, allowing authorised users to securely share data with one another, in real-time, regardless of their location.

OK, but after delivering all of this, what is the worst than can happen – well some passer by hacker or criminal could find a hole in some lackluster choice of Cloud, and then as if by magic they have also got access to your data – right?  Wrong! What they have actually achieved is to get access to data objects which have not only been encrypted with a military grade algorithm which has turned the meaningful content into unreadable gibberish, but more is the point here, the actual keys which were used to cloak such data assets are stored and locked away on a hardware based module – hence zero compromise has taken place.

cloudAshur is also rich with many other security features and high-end security functionalities, particularly with their Remote Management console which gives the Administrator the power to apply proximity policies, granting the authorized user the rights to only operate within approved locations, countries – these policies also allow the restriction by time when an authorized user may access the protected data assets, and of course allows the cloudAshur Administrator to revoke access at the touch of a button – See Fig 2 below for the cloudAshur Remote Management console’s Dashboard.

Fig 2 – iStorage cloudAshur Dashboard

cloudAshur is clearly an enterprise-based solution – but nevertheless makes it possible for even the smallest of SME’s to enjoy serious security capabilities that were once believed to be beyond their budget. With the ability to manage remote working and connections through the cloudAshur Remote Management console, the Administrator can instantly visualise how many devices are connected and see other meaningful security information such as how many devices have been disabled (revoked).

Conclusion

In the wake of multiple security breaches, and exposures, and of course not forgetting the mandated security expectations that fall under Data Protection, the consequence of GDPR financial implications, and the impact of Adverse Press, the word Cloud does set off much debate, and associated fear. However, with the proven track record of robust, certified products, this iStorage cloudAshur creation has just delivered a real game changer, enabling the Next Generation of Personal and Business Users, with the Next Generation of Robust Security which was once considered impossible. And given this is the first release of the cloudAshur, based on the past achievements of the iStorage Team, one may only expect this new delivery to go sky-high and onward, and upward.          

Professor John Walker
john_walkerVisiting Professor at the School of Science and Technology at Nottingham Trent University (NTU), Visiting Professor/Lecturer at the University of Slavonia [to 2015], Independent Consultant, Practicing Expert Witness, ENISA CEI Listed Expert, Editorial Member of the Cyber Security Research Institute (CRSI), Fellow of the British Computer Society (BCS), Fellow of the Royal Society of the Arts (RSA), Board Advisor to the Digital Trust, Writer for SC Magazine UK, Originator of DarkWeb Threat Intelligence, CSIRT, Attack Remediation and Cyber Training Service/Platform, Accreditation Assessor and Academic Practitioner and Accredited Advisor to the Chartered Society of Forensic Sciences in the area of Digital/Cyber Forensics.
Twitter: @SBLTD 
John Walker is also our Expert Panel member.  To find out more about our panel members visit the biographies page.

Professor John Walker Web Site
June 4, 2019 0 response
0 FacebookTwitterLinkedinWhatsappEmail
Study & Research

Cloud Security Alliance Study Identifies New And Unique Security Challenges In Native Cloud, Hybrid And Multi-cloud Environments

Expert(s): Cloud Security Alliance May 21, 2019
by: Cloud Security Alliance

Holistic cloud visibility and control over increasingly complex environments are essential for successful deployments in various cloud scenarios   

The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, and AlgoSec, the leading provider of business-driven network and cloud security management solutions, today announced the results of a new study titled, “Cloud Security Complexity: Challenges in Managing Security in Native Cloud, Hybrid and Multi-Cloud Environments.”    

The survey of 700 IT and security professionals aims to analyze and better understand the state of adoption and security in current hybrid cloud and multi-cloud security environments, including public cloud, private cloud, or use of more than one public cloud platform.   

Key findings of the study include:   

  • Cloud creates configuration and visibility problems: When asked to rank on a scale of 1 to 4 the aspects of managing security in public clouds they found challenging, respondents cited proactively detecting misconfigurations and security risks as the biggest challenge (3.35), closely followed by a lack of visibility into the entire cloud estate (3.21). Audit preparation and compliance (3.16), holistic management of cloud and on-prem environments (3.1), and managing multiple clouds (3.09) rounded out the top five.  
  • Human error and configuration mistakes the biggest causes of outages:  11.4% of respondents reported a cloud security incident in the past year, and 42.5% had a network or application outage.  The two leading causes were operational / human errors in management of devices (20%), device configuration changes (15%) and device faults (12%).
  • Cloud compliance and legal concerns:Compliance and legal challenges were cited as major concerns when moving into the cloud (57% regulatory compliance; 44% legal concerns).  
  • Security is the major concern in cloud projects:81% of cloud users said they encountered significant security concerns. Concerns over risks of data losses and leakage were also high with users when deploying in the cloud (cited by 62%), followed by regulatory compliance concerns (57%), and integration with the rest of the organizations’ IT environment (49%).   

“As companies of all sizes are taking advantage of the value of the cloud with its improved agility and flexibility, they are also facing unique new security concerns, especially when integrating multiple cloud services and platforms into an already complex IT environment,” said John Yeoh, Global Vice President of Research, Cloud Security Alliance. “The study findings demonstrate how important it is for enterprises to have holistic cloud visibility and management across their increasingly complex hybrid network environments in order to maintain security, reduce the risk of outages and misconfigurations, and fulfil audit and compliance demands.”   

“This survey makes clear that there is no one-size-fits-all cloud deployment model: organizations are choosing to adopt and use cloud resources in the way that suits their business needs. But this cloud flexibility also creates many security challenges for today’s enterprise. Irrespective of how they choose to use cloud resources, end-to-end visibility across the networks is critical to meet security and compliance obligations,” said Jeffrey Starr, CMO of AlgoSec. “Robust network security management and automation become increasingly mission critical. We see organizations moving to automate security management across native cloud, multi-cloud, and hybrid network estates, driving agility while ensuring continuous security for next-generation enterprise environments.”   

Commissioned by AlgoSec and conducted by the CSA, the survey also looked to uncover insights on topics such as workloads being used in or moved to the cloud and how they are being deployed/migrated; types of cloud platform(s) being used by companies; common security challenges faced by companies when deploying workloads in the cloud; methods of managing risk and vulnerabilities in the cloud environment; and causes of network or application outages and the amount of time it took to remediate.

May 21, 2019 0 response
0 FacebookTwitterLinkedinWhatsappEmail
Security Articles

Clouded Vision: How A Lack Of Visibility Drives Cloud Security Risk

Expert(s): Lora O’Haver April 5, 2019
by: Lora O’Haver

Lora O’Haver, senior solutions marketing manager at Keysight Technologies explains why a lack of visibility sits at the heart of cloud security concerns – and how that visibility can be achieved. 

Enterprises continue to migrate to the cloud with many using their cloud environments to support mission critical applications. According to RightScale, enterprises are on average running 38 percent of their workloads in public clouds, and 41 percent in private clouds.  

But as in weather forecasting, clouds can bring the risk of a storm. As cloud adoption gathers pace, so too do associated operating concerns. Ensuring the integrity of data, applications, and workloads processed in clouds is different than with on-premises infrastructure. Organizations migrating to the cloud – whatever their size, scope or industry – need to ensure adequate performance and security of workloads running on cloud infrastructure.
The question is, how do they achieve this? While cloud providers should offer a strong foundation for high-performance and security, the enterprise still needs to monitor cloud-based workloads. They are ultimately responsible for ensuring an adequate user experience and protecting sensitive customer data and applications.  

And one factor is fundamental to security, availability, and performance in the cloud. That factor is visibility. Ixia, a Keysight business, recently published the results of our survey on ‘The State of Cloud Monitoring,’ which polled 338 IT professionals at organizations from a range of sizes and industries globally. We found that 84 percent of companies placed additional workloads in the public cloud in 2018, and 21 percent reported that the increase was significant for them. The research also found that the top priority for cloud users is gaining visibility into application and data traffic – but fewer than 20 percent of participants said their company was currently able to properly monitor public cloud environments. 

Cloud obscures visibility 

Application performance and security are the two core concerns of any enterprise IT department. The former ensures effective operations and competitiveness; the latter ensures protection against a dynamic threat landscape. Cloud visibility is critical to both. Ninety-five percent of respondents to our survey had experienced either application or network performance problems because of cloud visibility issues, and 87 percent expressed concerns that a lack of visibility into cloud environments is obscuring security threats to their organization. 

Thirty-eight percent of participants cited insufficient visibility as a factor in application outages, and 31percent in network outages. Other issues, such as delays resolving a security alert (26 percent), problems with compliance (18 percent) and an inability to prevent security attacks (17 percent), underscore the significant consequences that respondents have experienced from a lack of cloud visibility. 

So, it’s no surprise that 99 percent of respondents stated that comprehensive cloud visibility has direct value to their organizations. The leading benefit was monitoring and ensuring application performance (cited by 60 percent). Security was also key, with 59 percent noting the value of visibility for threat prevention and 57 percent for identifying “indicators of compromise.” Respondents also cited the ability to monitor every link in the network (56 percent), the ability to balance workload between monitoring tools (37 percent) and the ability to monitor encrypted sessions (32 percent). 

Getting a clearer vision 

However, getting in-depth visibility to clouds isn’t always easy. Fewer than 20 percent of the IT professionals we surveyed reported they had complete, timely access to data packets in public clouds. In private clouds, the situation is somewhat better, with 55 percent reporting adequate access. In contrast, 82 percent have the visibility they need in their on-premises data center. Obviously, the visibility challenge of public clouds needs to be met head-on. 

Nine out of ten respondents believe visibility to packet data is what is required for effective monitoring. Eighty-six percent said it was important for network and application performance monitoring, and 93 percent stated it was valuable for security monitoring. Visibility is not only critical for understanding and maintaining workloads but is also vital for maintaining a good customer experience and service levels.      

Comprehensive cloud visibility is a must, not a nice-to-have 

As more applications and workloads migrate, organizations must focus more on managing application performance, documenting compliance, and maintaining security in their clouds. Claiming they can’t see what is happening in their clouds will carry no weight with an organization’s customers, board of directors, or auditors. But with the right approach to visibility, organizations can fully realize the benefits of the cloud, and eliminate the risks of storms caused by security breaches or poor user experiences.

Lora O’Haver

Lora O’Haver is a Senior Solutions Marketing Manager at Keysight, with over twenty-five years of experience in enterprise computing, networking, and cloud technologies. Lora is responsible for marketing Keysight’s network visibility and security solutions and is passionate about translating product capabilities into solutions that solve business and technology challenges.

She regularly produces articles, blogs, white papers, and presentations on topics related to network security and management, particularly in hybrid IT environments.

Lora joined Keysight through the acquisition of Ixia in 2017 and previously held a variety of senior marketing positions at Cisco and HP.



Lora O’Haver Web Site
April 5, 2019 0 response
0 FacebookTwitterLinkedinWhatsappEmail
Expert Comments

New Google Cloud Security Services From Vectra

Expert(s): Chris Morales March 11, 2019
by: Chris Morales

Following last week’s news that Google is now rolling out several new cloud security services, Chris Morales, head of security analytics at Vectra, has put together some commentary looking at what primary security concerns enterprises have as they move more workloads and data to the cloud as well as what the current state of security looks like in the cloud. 

Chris Morales, Head of Security Analytics at Vectra: 

“I think the biggest problem facing the cloud is ensuring only the right people have access to data stored in cloud workloads. Inside the confines of the enterprise network, misconfigured systems and applications aren’t as susceptible to compromise because there are already other internal controls limiting external access, but even then, these systems are easily compromised by attackers who infiltrate the network. In the cloud, a simple misconfiguration or exposure of system access means there are no defenses in place to stop someone from just taking everything. The potential for misconfiguration of access to cloud workloads is real, as evidenced by the Uber data breach among others. 

Security has become a necessity and not a nice to have with all the big cloud vendors building out capabilities for authentication, control, and visibility. The cloud providers (Amazon, Microsoft, Google) have also started implementing better integration for third-party security vendors to enhance cloud security capabilities. For example, Microsoft has introduced a network virtual tap in Azure to enable the monitoring of all network traffic underlying cloud workloads. Vectra leverages the Azure virtual network tap to apply machine learning models to this network traffic to identify unwanted changes in system traffic that would indicate an attack in progress. 

Any type of new services offered by the cloud vendors are useful, but there isn’t anything new being offered that was not already on offer by an existing vendor. There are entire markets built around web gateways, DDOS protection, and encryption key management. An evaluation would need to be performed to understand what benefits Google provides already well-established security vendors.” 

 

Experts Comments

Dot Your Expert Comments

Dot Your Expert Comments


Only for registered and approved experts. Please register before providing comments. Register here
* By using this form you agree with the storage and handling of your data by this web site.
Submit
Thank you, your comments have been submitted for review.
March 11, 2019 0 response
0 FacebookTwitterLinkedinWhatsappEmail
Newer Posts
Older Posts

SECURELY DOTTED BY

Javvad Malik, Security Awareness Advocate, KnowBe4

"Customers can inadvertently send sensitive personal information through insecure mechanisms. "

Expert On Facebook Introduces Whatsapp Carts

Andy Renshaw, VP of Payments Strategy & Solutions, Feedzai

"This move by Facebook and WhatsApp is a clear indication of where consumerism is heading. "

Expert On Facebook Introduces Whatsapp Carts

Trevor Morgan, Product Manager , comforte AG

"All enterprises should take away from this incident a very simple lesson. "

Expert Insight On Ransomware Forces Hosting Provider Netgain To Take Down Data Centers

Adrian Moir, Senior Consultant of Product Management, Quest

"In 2021, we’ll see the continuation of the shift from data centres to the collaborative cloud. "

Cyber Security Predictions 2021: Experts’ Responses

Ofer Israeli, CEO & Founder, Illusive Networks

"Continuation of ransomware, security savvy board members among top cyber trends for 2021. "

Cyber Security Predictions 2021: Experts’ Responses

Javvad Malik, Security Awareness Advocate, KnowBe4

"Innocent-looking phone charging cables or power banks serve as a great way to compromise a device. "

Police Warn Shared Power Banks Could Transmit Malware – Expert Reaction

Jamie Akhtar, CEO and Co-founder, CyberSmart

"Of late, we have also seen an increase in unexpected deliveries. "

Police Warn Shared Power Banks Could Transmit Malware – Expert Reaction

Jonathan Knudsen, Senior Security Strategist , Synopsys

"Fuzz testing minimises risk by helping developers harden the application to unexpected or malicious protocol inputs. "

Expert Insight On Amnesia:33 Vulnerabilities Impact Millions Of Smart And Industrial Devices

Boris Cipot, Senior Sales Engineer , Synopsys

"The difficulty is in ensuring that devices are patched, particularly for any low cost/high volume product. "

Expert Insight On Amnesia:33 Vulnerabilities Impact Millions Of Smart And Industrial Devices

Andy Renshaw, VP of Payments Strategy & Solutions, Feedzai

"Knowledge and speed across business sectors and financial institutions are essential to reduce cybercrime. "

Expert Reaction On Cybercrime Cost The World Economy More Than $1 Trillion In 2020

James Kretchmar, Vice President and CTO , Akamai Technologies Inc

"The criticality of the edge in 2021. "

Cyber Security Predictions 2021: Experts’ Responses

Jim Van Dyke, CEO , Breach Clarity

"Legacy solutions can’t meet their business requirements anymore. "

Cyber Security Predictions 2021: Experts’ Responses

Stuart Reed, UK Director, Orange Cyberdefense

"Cybersecurity will be a driver for commercial success. "

Cyber Security Predictions 2021: Experts’ Responses

Javvad Malik, Security Awareness Advocate, KnowBe4

"It is therefore essential for all organisations to build a culture of cybersecurity into its fabric. "

Cyberattack On Package Delivery Lockers In Moscow

Mark Crichton, Senior Director, OneSpan

"The year the cloud is finally embraced by financial services. "

Cyber Security Predictions 2021: Experts’ Responses

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel