Wednesday, July 19, 2017

More cloud leaks: Dow Jones' Amazon S3 bucket exposes customer data

Security Digest
Information security news and advice from TechTarget's network | July 19, 2017
TechTarget
FEATURED STORY
Another AWS cloud data leakage due to misconfiguration
by Michael Heller, Senior Reporter

Dow Jones becomes the latest organization to be affected by an AWS cloud data leakage due to misconfiguration and user error. (SearchSecurity.com)

Advertisement
NEWS
 
Misconfigured AWS S3 bucket exposes millions of Verizon customers' data

News roundup: An AWS S3 bucket containing personal data of millions of Verizon customers was exposed to the public. Plus, DNC hack victims are suing the Trump campaign, and more. (SearchSecurity.com)

 
Google tackles Android app privacy with machine learning

Google will use machine learning and automated peer review scans to improve Android app privacy and limit app permissions overreach. (SearchSecurity.com)

 
IT diversity and the cyberskills gap Q&A with Jules Okafor
Jules Okafor discusses the skills gap in the cybersecurity industry, how better IT diversity could help, and what is needed to bring in more women and minorities. (SearchSecurity.com)
 
 
 

Petya malware behavior may change based on AV installed

Researchers found changes in malware behavior when Petya detected certain security products, but experts are unsure why these features might exist. (SearchSecurity.com)

 
Symantec certificate authority business reportedly for sale
As Google and Mozilla prepare plans to reduce trust for Symantec's certificate authority, the antivirus vendor is reported to be seeking a buyer for its web certificate business. (SearchSecurity.com)
 
Risk & Repeat: Should IAM systems be run by machine learning?
In this week's Risk & Repeat podcast, SearchSecurity editors discuss the identity and access management industry and how machine learning algorithms could govern IAM systems. (SearchSecurity.com)
 
 
 
EXPERT ADVICE
 
Why security incident management is paramount for enterprises

Enterprises aren't truly prepared for cyber threats unless they have proper security incident management in place. Expert Peter Sullivan explains what enterprises need to know. (SearchSecurity.com)

 
How to use a cloud-based sandbox to analyze malware
A cloud-based sandbox can be a helpful tool for enterprises looking to bolster their intrusion prevention systems. Expert Rob Shapland explains how to leverage this technology. (SearchCloudSecurity.com)
 
 
 
 

How to detect preinstalled malware in custom servers

Preinstalled malware was reportedly found by Apple in its custom servers. Expert Nick Lewis explains how enterprises can protect themselves from encountering similar issues. (SearchSecurity.com)

 
How can enterprises address Nagios Core vulnerabilities?

Early versions of Nagios Core, the open source network monitoring tool, had privilege escalation vulnerabilities. Expert Judith Myerson explains the flaw and what to do about it. (SearchSecurity.com)

 
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Security Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2017 TechTarget. All rights reserved.
TechTarget

No comments: