29 Apr 2019

Security Pros Feel Aligned with Board, Still Fear a Phish

A recent report[pdf] by AT&T Cybersecurity shows that an increasing number of security professionals feel they are on the same page with the stakeholders, although the situation at larger organizations tends to be more harmonious than at small to mid-sized businesses (SMBs). Over a quarter (26%) of securty experts at

Read More
22 Mar 2019

Five Tech Trends Driving Cybersecurity In 2019

Cybersecurity is key to the top technology trends that are reshaping the digital era. Bob Bruns of Forbes Technology Council believes that the following five technology trends will be especially important in the context of cybersecurity this year: Analytics And Automation – The rapid development of artificial intelligence (AI) technologies

Read More
25 Jan 2019

Cloud Customers Faced 681M Cyberattacks in 2018

According to a new report by Armor, a total of 681 million cyberattacks targeted cloud customers in 2018. The most popular attack techniques employed by threat actors were exploiting software flaws; accessing accounts through by brute-forcing or through stolen login data; targeting poorly secured devices that are part of the

Read More
18 Jan 2019

Malware can now evade cloud security tools, as cybercriminals target public cloud users

Rocke Group, a cybercrime group believed to be operating from China, has developed cryptocurrency mining software that can uninstall cloud-based security solutions from targeted systems as a way of evading detection. Researchers with Palo Alto have so far only found proof that the malware works on Chinese cloud security solutions,

Read More
06 Dec 2018

DISA Outlines Plans to Wall Off the Public Internet

The DoD has been seeking white papers from vendors with plans for cloud-based systems that would effectively permit continued use of necessary internet connectivity but cut off public web access in a way that closes doors on most access points for hackers. Through the proposed system, all browsing would be

Read More
30 Nov 2018

FBI’s Counterterrorism Investigations Now Run on Amazon

An FBI Deputy Assistant Director for Counterterrorism recently announced a nearly two-year-old partnership between the bureau and Amazon in which Amazon’s cloud services are used to host and analyze counterterrorism intelligence, both classified and unclassified. The partnership emerged from what the FBI referred to as a “data crisis” that was

Read More
10 Oct 2018

Microsoft to Host the Government’s Classified Data Early Next Year

“Microsoft is making moves to target a growing multibillion market: hosting, storing and running the U.S. government’s most sensitive classified secrets and data. On Tuesday, the software giant announced it will join rival Amazon as the only commercial cloud providers with the security capabilities to host secret classified data by

Read More
21 Aug 2018

Someone Is Waging a Secret War to Undermine the Pentagon’s Huge Cloud Contract

“As some of the biggest U.S. technology companies have lined up to bid on the $10 billion contract to create a massive Pentagon cloud computing network, the behind-the-scenes war to win it has turned ugly. In the past several months, a private investigative firm has been shopping around to Washington reporters

Read More
27 Jul 2018

Bidding Begins for Pentagon’s Controversial $10 Billion War Cloud

The DoD is now accepting proposals for its 10-year, $10 billion Joint Enterprise Defense Infrastructure (JEDI) cloud contract, to be awarded to a single provider. The controversial contract will make a commercial company responsible for important workloads and classified military secrets accessible around the globe “in a single war cloud.”

Read More
22 Jun 2018

NSA moves its data to the “Intelligence Community GovCloud”

As part of a multi-year transition into a “big data fusion environment,” the NSA has successfully moved most of its data into the classified cloud computing system the “Intelligence Community GovCloud.” This new system allows analysts to access intel across sources, as well as employ machine learning and algorithms. The

Read More