5 tips to secure your Azure environment

Most of you are thinking about security. Many of you are using the cloud. And because many of you are Microsoft shops, you’re probably using – or likely to choose – Azure.

For those of you on Azure looking at cloud security, the first thing to understand is that, similar to other cloud platforms, Azure involves a shared security model. While Azure and Microsoft are responsible for securing its infrastructure, you remain responsible for securing your applications running in Azure.

As you move from Infrastructure as a Service (IaaS) to Platform as a Service (PaaS) to Software as a Service (SaaS) on the cloud continuum, you are responsible for more and more of your individual security controls. Therefore, you will need to follow cloud security best practices, including essential monitoring, scanning, and access control.

These five best practices will help you conquer security in Azure. Continue Reading…

Tags: , , , ,

The SIEM-ple way to spot a data breach as it’s happening

logLast July, the Office of Personnel Management announced it had discovered a huge data breach: The background check records of current, former, and prospective federal employees and contractors were stolen, including 21.5 million Social Security numbers. Like many security breaches, this one could have been averted with the right tools in place.

In its 2012 Data Breach Investigations Report, Verizon found that 84 percent of organizations that suffered a security breach the previous year had evidence of that breach in their logs. Every action your employees — or nefarious outsiders — take generates a kernel of information, which can become evidence of unusual behavior, or a trail of crumbs to follow after an attack to see how it was carried out.

But with so many logs and so much information to sift through, most organizations don’t tap the information these logs contain. Continue Reading…

Tags: , , ,
Test de Penetrare, Scanare de Vulnerabilitati, MoldovaTeste de Penetrare, Scanari de Vulnerabilitati, MoldovaPenetration Testing Moldova, Penetration Test Moldova, LogicalPoint