Silver Spring, MD, USA
Aug 3, 2019 | By CloudSploit
The recent disclosure of yet another cloud security misconfiguration leading to the loss of sensitive personal information made the headlines this past week. This particular incident came with a bit more information from the indictment of the accused party, allowing us to piece together the revealed data and take an educated guess as to what may have transpired leading up to the loss of over 100 million credit card applications and 100 thousand social security numbers.
Feb 4, 2019 | By CloudSploit
When we talk about cloud providers, we often forget that not all data is the same — even in the same application, while we might think of this data as from a “financial application” or a “computation process”, the reality is that each data set has subsets upon subsets, and thus require specific applications to manage them.
Dec 2, 2018 | By CloudSploit
Yet another Re:Invent has concluded, leaving behind a trail of announcements, new features, and vendor swag (how many T-shirts can we possibly own?). Security was a hot topic at this year’s conference; so much so that it was mentioned in-depth within the first 10 minutes of Andy Jassy’s keynote and numerous times afterwards, as well as during Werner Vogel’s keynote the following day.
Apr 8, 2018 | By CloudSploit
One of the most common business requirements data handlers face is the numerous data privacy standards present as industry standards. Each industry has their own variation, each with their own specific requirements — but regardless of the standard or the applied dataset, compliance is extremely important.
Aug 29, 2018 | By CloudSploit
CloudSploit's AWS Security scanning service requires a third-party cross-account role with an external ID. Learn how to connect your AWS account securely to CloudSploit.
May 25, 2018 | By CloudSploit
CloudSploit's AWS CloudFormation Security Scanner can detect security risks in your JSON or YAML CloudFormation templates before they are deployed to your environments.