State Department cyber strategy emphasizes proactively hunting for threats

Written by Suzanne Smalley Jun 27, 2022 | CYBERSCOOP The State Department Bureau of Intelligence and Research (INR) released a cybersecurity strategy Monday meant to address what the bureau’s chief…

How XDR Solutions Can Help You Achieve Zero Trust

As cyber risk continues to increase, organizations need to resort to new frameworks, architectures, and technologies to stay safe and secure. Enterprises’ attack surfaces are getting wider and attackers are…

GravityZone and Nutanix AHV: How Bitdefender promotes security efficiency for cloud workloads

As enterprises shift towards a cloud-first digital environment, the need to address an increased attack surface and new threats continues to rise. An organization’s use of cloud infrastructure promises efficiency…

380K Kubernetes API Servers Exposed to Public Internet

More than 380,000 of the 450,000-plus servers hosting the open-source container-orchestration engine for managing cloud deployments allow some form of access. More than 380,000 Kubernetes API servers allow some kind…

New research identifies poor IAM policies as the greatest cloud vulnerability

Written by CyberScoop Staff May 18, 2022 | CYBERSCOOP Misconfigurations continue to be the leading cause of most cloud security incidents — many of those as a result of poorly written…

Join Bitdefender at CyberTech Europe 2022 | Exploring Best Practices in Cloud Security, Zero Trust, and More

The enterprise cybersecurity landscape has changed dramatically in recent years. The COVID-19 pandemic spurred a rapid, global shift to remote and hybrid work, accelerating digital transformation initiatives and the widespread…

Deep Dive: Protecting Against Container Threats in the Cloud

A deep dive into securing containerized environments and understanding how they present unique security challenges. Containers are self-contained pods representing complete, portable application environments. They contain everything an application needs…

Cloudy With A Chance of A Security Breach: Why CWS and XDR Solutions Should Be On Your Radar

Security leaders are constantly looking to further mature their security organization and continuously build up their security department and tech stack. Identifying key risk gaps and areas of exposure is…

Security Turbulence in the Cloud: Survey Says…

Exclusive Threatpost research examines organizations’ top cloud security concerns, attitudes towards zero-trust and DevSecOps. Over the past 15 years, the cloud has blown business into a new age of networking,…

Firms Push for CVE-Like Cloud Bug System

Researchers propose fresh approaches to cloud-security bugs and mitigating exposure, impact and risk. Big gaps exist in the 22-year-old Common Vulnerability and Exposures (CVE) system that do not address dangerous…