

Chris DeRamus
CTO and co-founder /*=$expert->feature_status*/ ?>
DivvyCloud
Comments Dotted :
6
May 20, 2020
ompanies should follow the principle of least-privileged access when provisioning identity and access management (IAM) permissions.
Airports and airlines are increasingly reliant on technology and the global aviation industry is more connected than ever before, making these companies much more susceptible to cyberattacks. Research from ImmuniWeb found that 97% of the world’s top airports failed the cybersecurity posture test administered by the firm. Unfortunately, this data breach impacting easyJet passengers illuminates how many organizations’ cybersecurity and compliance practices are reactive.
To properly protect.....Read More

November 05, 2019
Misconfigurations will continue to plague organizations in 2020
Cloud misconfigurations will continue to cause massive data breaches. As enterprises continue to adopt cloud services across multiple cloud service providers in 2020, we will see a slew of data breaches caused by misconfigurations. Due to the pressure to go big and go fast, developers often bypass security in the name of innovation. All too often this leads to data exposure on a massive scale such as the First American Financial Corporation’s breach of over 885 million mortgage records in.....Read More

August 21, 2019
Companies continue to suffer breaches from misconfigurations
Leaving servers unprotected seems like such a simple mistake to avoid, but more and more companies suffer data breaches as the result of misconfigurations, and we read about them in the news almost every day. Suprema joins Aavgo, University of Chicago Medicine, Rubrik, Gearbest, Ascension and countless other organizations this year as victims of data leaks due to misconfigurations. The truth is, organizations are lacking the proper tools to identify and remediate insecure software.....Read More

August 21, 2019
Ignoring vulnerabilities that are reported by white hat hackers is not a wise move.
Leaving 58,000+ records containing payment card data unencrypted on a publicly accessible database is concerning, however, the fact that MoviePass initially ignored the vulnerability when it was notified is even worse. Misconfigurations like this are frequent, and enterprises should be thankful when white hat security researchers flag vulnerabilities before they can be exploited. Consumers that trusted MoviePass with their data expect their personally identifiable information to be protected.....Read More

August 07, 2019
Organizations must change how they deploy and build apps entirely
To avoid incidents misconfigurations like what Honda experienced, organizations should change how they deploy and build applications entirely. Not necessarily just a technology shift, but more of a cultural change. Everything an IT department does will need to change: how they deploy applications, what applications they build, how they learn from their customers, etc. All of that has to change because engineering teams have direct access to infrastructure and old processes aren’t going to.....Read More

August 07, 2019
Organizations need to leverage AWS S3 access policies
In Capital One’s case, this was a misconfigured firewall that led to the exposure of an Amazon S3 bucket. But similar to S3 bucket configuration, firewalls can only be accessed by users explicitly given access. S3 buckets, however, by default, only grant access to the account owner and the resource creator, so someone has to misconfigure an S3 bucket deliberately to expose the data.
As a most basic first step to avoiding S3 bucket leaks, companies need to take advantage of native AWS.....Read More
