Part two of 'Escaping the Egregious Eleven’

Part two of 'Escaping the Egregious Eleven’

Many thanks to anyone who read or shared my last blog Escaping the Egregious Eleven – Part One on Tripwire's ever informative and always worth visiting State of Security. The concluding part has now been published which explores the next and final five items of consideration in the CSA list:

  • Insecure APIs
  • Weak Control Plane
  • Metastructure and Applistructure Failures
  • Limited Cloud Usage Visibility
  • Abuse and Nefarious Use of Cloud Services

Do please read Cloud Security Threats: Escaping the Egregious Eleven – Part Two here.

Continuing on a cloud security theme, I was honoured to contribute to another well curated Tripwire crowdsource piece also this month, containing some sound advice from a variety of security professionals. You can read How to Implement an Efficient Cloud Security Strategy here.

要查看或添加评论,请登录

Angus M.的更多文章

  • I, CyBOK – An Introduction to the Cyber Security Body of Knowledge Project

    I, CyBOK – An Introduction to the Cyber Security Body of Knowledge Project

    I have a brand new blog published over on Tripwire's always worth visiting State of Security today. It takes a quick…

    4 条评论
  • Escaping the 'Egregious Eleven’

    Escaping the 'Egregious Eleven’

    A belated thanks to anyone who read my last blog Living the 7 Habits of Highly Effective Cybersecurity published back…

  • Living the 7 Habits of Highly Effective Cyber Security

    Living the 7 Habits of Highly Effective Cyber Security

    A Magnificent 7 of habits worth picking up It's been a while but I have a brand new blog published on Tripwire's always…

  • NCSAM - Security, still a shared responsibility.

    NCSAM - Security, still a shared responsibility.

    Since 2004, the USA has led the way in championing October as being ‘National Cyber Security Awareness Month’ (NCSAM)…

    4 条评论
  • PCI-DSS in Perspective

    PCI-DSS in Perspective

    Its been a while but I have a brand new article over on Tripwire's always worth visiting State of Security this…

  • Immutable Integrity? – Blockchain Beyond the Bluster

    Immutable Integrity? – Blockchain Beyond the Bluster

    I have a brand new article over on Tripwire's always worth visiting State of Security this morning. It briefly takes a…

  • Security & the ‘Weaponization’ of Misinformation

    Security & the ‘Weaponization’ of Misinformation

    I have a brand new article over on Tripwire's always worth visiting State of Security this morning. It discusses the…

    5 条评论
  • Festive Phishing

    Festive Phishing

    I have a brand new article over on Tripwire's always worth visiting State of Security this morning. Its a short…

    7 条评论
  • DDoS & IoT - A ‘Perfect’ Storm

    DDoS & IoT - A ‘Perfect’ Storm

    I have a brand new article on Tripwire's always worth visiting State of Security this afternoon. It was originally…

    2 条评论
  • National Cyber Security Awareness Month (NCSAM)

    National Cyber Security Awareness Month (NCSAM)

    October is National Cyber Security Awareness Month (NCSAM) - a great US initiative started way back in 2004. You…

    5 条评论

社区洞察

其他会员也浏览了