Comprising more than half of all cyberattacks, file-based attacks (.DOCX, .pdf, etc.) enable malware to spread into other files and across different systems. These attacks can be sophisticated, able to use deception to take path-traversal courses to get at sensitive data or spread silently, closing portals and deleting files behind them to hide their presence. […]
Atomicorp’s cloud and server security and compliance systems now work with Intensity Analytics’ TickStream.Key.ID to red flag potential account compromises which automatically trigger suspicious activity alerts and support an adaptive security model. In addition, TickStream.Key.ID provides improved visibility into and accountability for privileged access accounts to protect against insider threats. Atomicorp’s products enable customers to […]
This is part 2 of a 7-part series on PCI compliance in the cloud. Most businesses have assets in their environments that they aren’t aware exist. For instance, if a virtual machine is de-provisioned in the cloud environment, its file system may still live on − unprotected, unaudited, and but still inside the scope of […]
This is part 1 of seven-part series on achieving PCI compliance in the cloud. Shared Responsibility isn’t as easy as it sounds When businesses sign a service level agreement with a cloud provider, they may believe the provider will protect everything in their cloud− infrastructure and applications alike. But in each contract there is […]