When AI….goes bad
Couldn’t resist the trash TV title, sorry…. (hoping to sell the rights to Channel 5 in the UK). I spotted a report last week on the topic of ‘Malicious AI’ and thought it worth sharing a summary for those too time poor to read it in full – it’s 101 pages, albeit a pretty easy […]
How to continuously assess the security of your AMIs
Jawad Seddar, Cloud Systems Developer at Cloudreach, gives insight on a continuous AMI assessment process using Amazon Inspector, Lambda and CloudWatch. Vulnerability assessments When deploying resources in the cloud or in your datacenters, it’s always recommended to make sure they are not affected by known vulnerabilities as these can easily be leveraged to […]
Blockchain Technology – Disrupt everything
Blockchain Technology – Disrupt everything I hate the word “disrupt.” It drives the implication that an entire industry is capable of being interrupted or completely tossed on its head. Instead I substitute that word — I prefer to think of it as an evolution. Netflix didn’t disrupt watching movies and tv, they evolved that experience […]
AWS KMS Envelope Encryption
Today the Cloudreach blog covers a topic that is hot, hot, hot given the continuing security breaches, challenges and discussions around the globe. Specifically, we’re going to talk about encryption in AWS and how to make AWS Key Management Service (KMS) secure for your needs. The functionality that KMS provides is great, and with a […]
What the AWS Outage Teaches Us About the Shared Responsibility Model
It was essentially a fat finger on the command line. Everyone in IT has done it at one point in their career.
Is IoT Safe for your Business?
Back in January I wrote a post on IoT and the year ahead. I suspect the past few weeks’ activities have given IoT somewhat more press than my humble ramblings. Pretty much no one escaped the news that there have been some interesting new variants on the good old fashioned Distributed Denial of Service (DDoS), […]
Public Cloud: Definitely More Secure Than Your Own Datacentre
Headline too strong for you? Well, it was inspired by a couple of conversations this week that took me back in time to 2011 when I first joined Cloudreach, and the business world was a little more suspicious of cloud security.
Ahead of the Hackers: A Guide to Offensive Security with Free Tools and Tips
The advent of new IT environments and cloud adoption has brought about the new challenge of how to defend it from potential threats and malicious use. In this post we’ll offer you some insight into free security scanning tools that will help you to protect your systems, giving some Cloudy advice along the way.
A How-To Guide for Preparing your Cyber Incident Response Program
It’s Security Awareness Week at Cloudreach, and we’re bringing you a special guest blog post from our Partner Alert Logic!