• Skip to primary navigation
  • Skip to content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Log In
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Downloads
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
Network Security

These 4 Solutions Help Companies Keep Hackers Out of Their Cloud

With more companies using the Cloud to store data, more security protections are being developed to keep sensitive information safe, and the bad guys out.

June 13, 2018 Jessica Messier Leave a Comment

While many companies and individuals are using the Cloud as a lockbox for personal information, it’s become a one-stop-shop for hackers looking to steal data, according to Fast Company. Nowadays, hackers are sending bots to scour GitHub, a source code management system, to find the virtual keys to cloud systems.

As a result, cloud managers are trying to add an extra layer of protection to their Cloud storage banks. For example, HashiCorp now has an open-source tool called Vault, which stores and encrypts sensitive credentials, and tightly regulates who and what programs can access them, Fast Company says. The solutions also logs who accesses which data, and when. “In some cases, it can also generate temporary credentials that give people permissions to use Cloud resources for a limited time,” Fast Company says.

Amazon recently launched AWS Secrets Manager, “its own credential management tool,” which will help users utilizing Amazon, according to Fast Company. The tech giant also offers Amazon Macie, which “uses machine learning to detect unusual access patterns to cloud storage and uploads potentially sensitive data like access keys.” Amazon also took steps to prevent users from accidentally storing passwords and other important information by developing source code repositories, among other tools to wipe out credentials from existing code.

Other tools like UpGuard’s BreachSight “help detect if secure data is being sent and stored where it doesn’t belong,” Fast Company says. BreachSight combs the internet and alerts companies if any code, credentials and/or other personal data have been exposed.

Mike Baukes, cofounder and co-CEO, says that hopefully, tools like these will be included in future cloud computing contracts, which will give companies a leg up on cloud security from the get-go.

“What we’ll see over time is a lot of those services will just be bundled in for developers to use by default,” he told Fast Company.

Tagged With: Cloud, Cyber Attacks, Cyber Security

Related Content:

  • Who Got Hacked This Week? February 15 Edition
  • Illinois Supreme Court Aims to Protect Privacy from…
  • Who Got Hacked This Week? February 8 Edition
  • Who Got Hacked This Week? February 1 Edition

Free downloadable guide you may like:

  • RFP Template: Essential Guide

    If you are a technology decision-maker, chances are that you have to write requests for proposals (RFPs) on occasion. It’s an important part of every IT pro’s job. Unfortunately, it also one of the most dreaded. Our editors can help.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

RFP Template: Interactive Whiteboards

Are you in the market for an interactive whiteboard? Whether you are a company shopping for a huddle room or school looking for a classroom solutio...

RFP Template: Video Walls

You may be looking for a video wall to promote the next sporting event on a college campus or an eye-catching display at your new company headquart...

RFP Template: Projectors

Writing a request for proposal (RFP) takes a lot of time. Many of our readers say that it is one of the least favorite parts of their job. We want ...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions / Advertise
  • Comment Guidelines
  • RSS Feeds
  • Terms of Use
  • Privacy Policy
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!

© 2019 Emerald Expositions, LLC. All rights reserved.