Blog

Cryptomining Malware Using NSA Hacking Code is Spreading Rapidly

Cryptomining Malware Using NSA Hacking Code is Spreading Rapidly

The combination of an anonymous currency and leaked government security exploits have led to a rising new threat for system administrators. While cybercriminals have long featured an assortment of ideologically driven activists or rising stars hoping to make a name for themselves with their peers, the vast majority of them are motivated by money. In […]

Read More…

Lacework Threat Detection in Cloud Environments: A Quick Guide

Lacework Threat Detection in Cloud Environments: A Quick Guide

There’s an enormous amount of event activity in the cloud. A busy cloud environment can generate eight to ten billion events per month, which makes threat detection a challenge. Moreover, in the cloud where ephemeral servers and containers come and go on-demand, malicious activity can escape detection unless the visibility into events and behaviors is […]

Read More…

Top Threats to Cloud Security

Top 10 Threats to Cloud Security: AWS Security Week New York

Last week I had the pleasure of attending my first AWS Security Week. This was held at the AWS New York City loft from April 15th – April 18th. The AWS Lofts are a cool place for people to come to hang out, meet, code, etc. – all free of charge. AWS frequently hosts weeks […]

Read More…