We’ve all heard about the CapitalOne breach. It dominated headlines for weeks and is a prime example of how even the largest and best trained organizations – ones who clearly put security at the top of their mind – can fall victim to sophisticated cloud attacks.
Migrating workloads to public cloud environment opens up organizations to a slate of new, cloud-native attack vectors which did not exist in the world of premise-based data centers. In this new environment, workload security is defined by which users have access to your cloud environment, and[...]
We’ve all seen this scene in some movie or TV show: a hacker sits in a shadowy room, busily typing on his keyboard. Suspenseful music plays in the background, the camera pans around him in a slow movement, and within the space of a few clicks – voilà! – our protagonist has broken into the[...]
A common concern of our customers using cloud platforms like AWS is the horror tales about a negligent (or uninformed) developer inadvertently exposing AWS API keys online, only for hackers to find those keys, penetrate the account and cause massive damage.
Let’s start with the tricky truth: the problem with stopping data breaches is not about detection. We’ve seen this time and time again at GlobalDots, where we partner with security providers and customers alike to consult and provide security solutions to the new and evolving threats in the[...]
Moving to the cloud is all about agility and speed. But this agility and flexibility frequently come at the expense of security, leaving organizations, customers, and their data at risk. Moreover, as more and more organizations adopt multi-cloud and hybrid cloud strategies, this is adding[...]
A revolution is occurring as you read this. There has been a huge increase in the adoption of APIs and API-based applications. This surge in API use has opened up many opportunities, alongside a new world of vulnerability, allowing greater connectivity and accessibility, but also posing[...]
According to new research, a rising rate of coronavirus infections has been met with a declining rate of reported cybersecurity breaches. The finding, from the Identity Theft Resource Center (ITRC), shows that publicly reported US data breaches dropped 33% in the first half of 2020 compared with[...]
Credential stuffing is a type of cyberattack where stolen account credentials typically consisting of lists of usernames and/or email addresses and the corresponding passwords (often from a data breach) are used to gain unauthorized access to user accounts through large-scale automated login[...]
Our unique positioning on the global market enables us to be at the forefront of every new technology and with that unique expertise we help our clients to quickly and cost effectively choose, test and deploy the best solutions to service their customer base.