Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Cloud Computing

Now Available: Use Resource-Level Permissions to Control Access to and Permissions on Auto Scaling Resources

16 May 2017

As of May 15, 2017, you can define AWS Identity and Access Management policies to control which Auto Scaling resources users can access and the actions users are …

Tags Access, Amazon, Amazon EC2, Announcements, Available, AWS, Cloud Computing, Permissions, Resources

The WannaCry Ransomware is a Reminder to Get Serious About Security

16 May 2017

WannaCry Ransomware Attack Ransomware is the word on everyone’s lips this week, following the massive WannaCry ransomware attack which spread quickly all over the world. Security experts estimate …

Tags About, Cloud Computing, Get, Ransomware, Saas, WannaCry

Microsoft Faulted Over Ransomware While Shifting Blame to NSA

16 May 2017

There’s a blame game brewing over who’s responsible for the massive cyberattack that infected hundreds of thousands of computers. Microsoft Corp. Read full news article on Talkin’ Cloud …

Tags Cloud Computing, Cloud Computing Security, Microsoft, NSA, Ransomware

Can You Afford the Risk of Going to the Cloud?

16 May 2017

Risk of Going to the Cloud If you’re considering a migration to a public cloud environment, you’re most likely motivated by the potential to reduce costs, while increasing …

Tags Cloud, Cloud Computing, Contributors, Hybrid Cloud, Private Cloud, Public Cloud, Risks

Succeeding with Artificial Intelligence

16 May 2017

An integrated AI platform that can bring together all aspects of machine learning to work with the deep knowledge of an organization—continuously and contemporaneously—is the answer to the …

Tags Advanced Analytics, APIs, Artificial Intelligence, Automation, Cloud, Cloud Computing

mSecure 5 password manager: Why Dropbox, iCloud, Wi-Fi, or shared file cloud syncing aren’t available

15 May 2017

If all your website, cloud service, application, investment, banking, credit cards, and other sensitive account information falls into the wrong hands, that’s a crisis situation. mSeven Software, which …

Tags Apple, Cloud Computing, Cloud Storage, Dropbox, iCloud, Storage, Wi-Fi

NuCypher is using proxy re-encryption to lift more enterprise big data into the cloud

15 May 2017

After spending time at a London fintech accelerator last year, enterprise database startup ZeroDB scrapped its first business plan and mapped out a new one. By January this year it …

Tags Battlefield, Big Data, Cloud, Cloud Computing, Compliance, Encryption, Events, Finances, GDPR

FireEye, Symantec Jump as Ransomware Hack Seen Boosting Spending

15 May 2017

FireEye Inc., Symantec Corp. and other cybersecurity stocks jumped Monday as a global computer hacking attack entered its third day, suggesting higher corporate and government spending on their …

Tags Business, Cloud Computing, FireEye, Hacks, Investing, Ransomware, Spending, Symantec

Digital Surveillance Is Class Warfare

15 May 2017

The many phones, laptops, and sundry gadgets most of us use every day track our location, our habits, and our preferences. The privacy threats may be pervasive, but …

Tags Advertising, AI, Algorithms, Analytics, Analytics (Cloud Computing), Big Data, Cloud Computing, Digital

VMware: Transforming Security Within Your Business

15 May 2017

In this second of a four-part video series, Richard Munro, global cloud strategy director at VMware, discusses the importance and benefits of taking a Cross-Cloud approach to help …

Tags Business, Cloud, Cloud Computing, Cloud Strategy, Hybrid Cloud, Private Cloud, Public Cloud, Virtualization, VMware

Cloud security faces the public sector test – a Q/A with Doug VanDyke of AWS

15 May 2017

One highlight of the Infor Federal Forum was a view from AWS on the dynamics of public sector security. I missed him that day, but I tracked down …

Tags Amazon, AWS, Cloud, Cloud Computing, Cloud Provider, Frameworks, Hybrid Cloud, Private Cloud, Public Cloud

VMware on What Happens at Dell EMC World – Gets Shared in Top Mobile News!

15 May 201715 May 2017

VMware, Dell and you. Minimize user downtime. Reduce admin overhead. Align with compliance and IT security policies. That’s how you win with our big Dell EMC World announcement: …

Tags App Stores, Cloud Computing, Data Center, Hybrid Cloud, Microsoft Windows 10, Mobile, Monitoring, Private Cloud, Public Cloud

Cryptographic Key Generation – It’s Time To Pay Attention

15 May 2017

Cryptographic Key Generation When we think about cryptographic keys, we tend to think about closely guarded secrets. Keys are the only thing that keeps the attacker away from your …

Tags Advice, Cloud Computing, Contributors, Generation, Keys

Citrix Synergy: Visit IGEL – Fast Track Your ‘Path to Success’ – Booth #207

15 May 2017

Citrix Synergy is around the corner.  This year’s theme, Path to Success, fits IGEL beautifully as we mark a record year in which IGEL’s endpoint management solutions were …

Tags Citrix, Cloud Computing, Fast, Hybrid Cloud, Management, Microsoft Windows 10, Private Cloud, Public Cloud
Post navigation
Older posts
Newer posts
← Previous Page1 … Page415 Page416 Page417 Next →
Cookie-Free

NVD

  • CVE-2022-34835 – In Das U-Boot through 2022.07-rc5, an integer signedness error and resultant stack-based b …30 June 2022
  • CVE-2017-20121 – A vulnerability was found in Teradici Management Console 2.2.0. It has been declared as cr …30 June 2022
  • CVE-2017-20122 – A vulnerability classified as problematic was found in Bitrix Site Manager 12.06.2015. Aff …30 June 2022
  • CVE-2017-20123 – A vulnerability was found in Viscosity 1.6.7. It has been classified as critical. This aff …30 June 2022
  • CVE-2017-20124 – A vulnerability classified as critical has been found in Online Hotel Booking System Pro P …30 June 2022
  • CVE-2017-20125 – A vulnerability classified as critical was found in Online Hotel Booking System Pro 1.2. A …30 June 2022

EXPLOITS

  • Mailhog 1.0.1 – Stored Cross-Site Scripting (XSS)28 June 2022
  • WSO2 Management Console (Multiple Products) – Unauthenticated Reflected Cross-Site Scripting (XSS)28 June 2022
  • WordPress Plugin Weblizar 8.9 – Backdoor28 June 2022
  • HP LaserJet Professional M1210 MFP Series Receive Fax Service – Unquoted Service Path14 June 2022
  • Virtua Software Cobranca 12S – SQLi14 June 2022
  • Marval MSM v14.19.0.12476 – Cross-Site Request Forgery (CSRF)14 June 2022

SECURELIST

  • The SessionManager IIS backdoor30 June 2022
  • The SessionManager IIS backdoor: a possibly overlooked GELSEMIUM artefact30 June 2022
  • The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs23 June 2022
  • APT ToddyCat21 June 2022
  • ‘Unpacking’ technical attribution and challenges for ensuring stability in cyb20 June 2022
  • How much does access to corporate infrastructure cost?15 June 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »