Ransomware in the Cloud: Breaking Down the Attack Vectors
The number of ransomware attacks, especially those involving Amazon S3 buckets, Azure Storage accounts and other cloud assets, has increased in recent years. Still, most organizations don't act to...
View ArticleOpenAI Custom GPTs: What You Need to Worry About
The integration of OpenAI's Custom GPTs with personal data files and third-party APIs offers new opportunities for organizations looking for custom LLMs for a variety of needs. They also open the door...
View ArticleRedshift Security: Access and Data Flows Explained
This blog post is the first in a series that exposes security risks, possible attack vectors, and how to hunt and prevent them using data detection and response (DDR). When correctly configured,...
View ArticleRedshift Security: Data Backups and Encryption Best Practices
In this blog post, second in a series, we focus on risks that come from a misconfigured Redshift, like encryption, backups and logs. We’ll explore security features and best practices that can prevent...
View ArticleRedshift Security: Attack Surface Explained
In our previous two posts, Access and Data Flows and Data Backups and Encryption, we discussed security best practices to implement least-privileged access on Redshift and reduce the static risk...
View Article
More Pages to Explore .....