Security in the cloud is different from traditional best practices for securing on-prem deployments. This blog provides an AWS security checklist that includes the most crucial steps for implementing network security best practices within a cloud environment.
About Igor Livshitz
Igor is a cyber security expert with over 12 years of hands-on experience in a wide variety of technologies. Igor has vast experience in managing R&D teams in innovative projects and a proven track record of delivering great products tailored to the customers’ needs.
Entries by Igor Livshitz
Allowing security to be an enabler of cloud adoption instead of a hurdle to overcome was a major talking point at this year’s AWS re:Inforce conference. Best practices in scale, coverage, automation, migration and flexible policy were all valuable takeaways – and Guardicore’s micro-segmentation technology is a single, unifed solution for all platforms that checks all the boxes.
Docker, Kubernetes, and even Windows Server Containers have seen a huge rise in popularity the last few years. With the application container market having a projected CAGR (Compound Annual Growth Rate) of 32.9% between 2018 to 2023, we can expect that trend to continue. Containers have a huge impact on application delivery and are a […]
Like with any technology, Docker too has its own set of security concerns. Learn the Docker security best practices that will help keep your infrastructure and applications secure.
A major vulnerability related to containers was released on Feb 12th. The vulnerability allows a malicious container that is running as root to break out into the hosting OS and gain administrative privileges.
A low interaction honeypot is simple to deploy and takes very little effort to maintain, but can never provide the benefits you can enjoy with the latest high interaction honeypot technology. When dynamic deception meets micro-segmentation, you have a truly risk-free decoy to fool attackers and learn about their behavior.
Implementing a sound micro-segmentation approach is one of the best steps that security teams can take to gain greater infrastructure visibility and secure critical applications, helping organizations protect high-value targets.
File integrity monitoring is an internal control that examines files to see the way that they change, and is essential for breach detection, giving you the granular, real-time information on every change to your files, including the who, what, where and when.
An attack vector is the way that an adversary can gain unauthorized access to your network or devices. What should smart businesses look out for, and how can they protect themselves against these increasingly sophisticated cyber attacks and threats?
Everyone knows about the many benefits of the cloud: it is infinitely scalable, developer-friendly, and easy to use. However, we often avoid addressing the reality that the cloud is not perfect. The truth is that, despite the cloud’s many merits, it presents a significant challenge from a security standpoint.