Comprehensive software reviews to make better IT decisions
Hacker Compromises Data of 106 Million Capital One Customers
Tech worker Paige A. Thompson has been charged with computer fraud for compromising the data of 106 million Capital One customers.
Thompson took advantage of a firewall misconfiguration to access data stored in a Capital One cloud server.
The cloud provider was confirmed as Amazon Web Services. Thompson was also revealed to be a former Amazon Web Services employee.
Source: SoftwareReviews Amazon Web Services Scorecard, accessed August 14, 2019
In their statement, Capital One said that “this type of vulnerability is not specific to the cloud.” What this means is that the data breach had nothing to do with security vulnerabilities of Amazon Web Services itself. The problem instead lay with a misconfigured firewall internal to Capital One.
Indeed, the relevant takeaway from this story is probably not to do with the security of Amazon Web Services. It is instead to do with why Capital One’s own Cloud Custodian – an open source governance, security, and compliance engine for cloud services – overlooked this firewall misconfiguration.
As always, clients should ensure that data stored anywhere (either in the cloud or otherwise) is protected by secure firewalls. Info-Tech’s security blueprints offer effective strategies to ensure clients can appropriately select and implement firewalls, alongside specific information on cloud security.
Source: Info-Tech Research Group Ensure Cloud Security in IaaS, PaaS, and SaaS Environments
Want to Know More?
Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created with the purpose to set service-level agreements (SLAs) with risk tolerance in mind.
With its announcement of SvKMS, StorMagic, known for leading-edge storage solutions, has officially entered the security marketplace. SvKMS provides key management for any application that requires encryption in any location – edge, datacenter, or cloud – the proverbial magic bullet for KMS.
We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at securing their networks against cyberattacks. While organizations continue to have exploitable weaknesses, attackers are having greater difficulty penetrating deeper into businesses’ networks.
Four zero-day vulnerabilities were discovered in IBM’s Data Risk Manager. While the vulnerabilities are concerning, more so is IBM’s response when addressed. The company simply stated, “It’s out of scope.” – meaning it had no intention to rectify or address the issue.
Will New IoT Security Frameworks Push Compliance Obligations to the Forefront of Security Discussions?
The Internet of Things is increasingly embedded with our daily lives. While these devices make life more accessible, for every new device, a new attack vector for cyberattackers is created.
The impact of COVID-19, as it became a global pandemic in Q1 of 2020, has affected user sentiment toward software during a growing period of fear, uncertainty, and doubt. To analyze the impact, SoftwareReviews compared Satisfaction (willingness to recommend to a peer), ability to deliver Business Value (fair cost to value), and Likeliness to Renew prior to March 10 and post March 10.
Qualys VMDR Is Now Live: Increasing Security Threats Requires Strong Vulnerability Management Software
Qualys VMDR has hit the live market. Originally unveiled in February 2020 at Qualys Security Conference, VMDR is now publicly available as of April 16, 2020. Partnering with both large and small MSSPs, VMDR is designed to be scalable to any business enterprise and to automate the entire management cycle on all endpoints.
As the SIEM market continues to grow, organizations have more options than ever to decide which SIEM is right for them. In the first of this five-part series on SIEM pricing, we investigate the different pricing options and what these mean for organizations looking to invest in a SIEM.
Microsoft’s end-of-life support for Windows 7 has run into its first set of issues with its extended security updates (ESUs). Administrators who paid for the ESU found out their downloads are not applying.