Home Vulnerabilities Preventing Criminals from Using Cloud Applications to Inject Chaos Into Work Environments

Preventing Criminals from Using Cloud Applications to Inject Chaos Into Work Environments

In 2020, cyber criminals used cloud applications, the cover of a pandemic, and a newly embraced work-from-home culture to serve up ransomware, steal data, and disrupt how companies do business. The year is over, but the challenges and risks remain.  How do we prevent these criminals from injecting chaos into our hybrid work environments?

As I’ve been preaching for years, the new security paradigm has shifted to focus on applications, users, and data.  Although the network and endpoint still play an important role in security, the shift to secure user access to applications and data has accelerated, especially in a work from anywhere environment.  But where should organizations start?

Doni Brass, Product Management Lead at Cisco Umbrella, joined Enterprise Security Weekly to we lay out how companies and their IT teams can stave off threats in the cloud app discovery process, stop data from landing in the wrong hands, and identify and block cloud malware that can cost both time and treasure!

During the interview, Doni explains the evolution of Cisco Umbrella from OpenDNS to developing a Secure Web Gateway with Firewall and Cloud Access Security Broker (CASB) capabilities to evolving into a Secure Access Service Edge (SASE).  Doni then describes how Cisco Umbrella can protect against various attacks, including:

  • Controlling access to cloud applications, while balancing productivity and security
  • Preventing data leakage leveraging traditional CASB capabilities
  • Limiting OAuth permissions to access data through third party applications

Cisco Umbrella offers flexible, cloud-delivered security when and how you need it. It combines multiple security functions into one solution, so you can extend protection to devices, remote users, and distributed locations anywhere by providing:

  • Intelligence to uncover current and emerging threats
  • Visibility across all devices, ports, and cloud services, anywhere
  • Prevention of phishing, malware, and ransomware attacks

To learn how to prevent criminals from using cloud applications to inject chaos into your work environment, watch the interview on Enterprise Security Weekly here, register for their upcoming webcast here,  or visit securityweekly.com/ciscoumbrella for more information.

Source link


New infosec products of the week: July 23, 2021

Stellar Cyber XDR Kill Chain allows security analyst teams to disrupt cyberattacks Stellar Cyber introduced a...

Kaseya Gets Universal Decryptor to Help REvil Ransomware Victims

Nearly three weeks after Florida-based software vendor Kaseya was hit by a widespread supply-chain ransomware attack, the company on Thursday said it obtained...

Kaseya obtains REvil decryptor, starts sharing it with afflicted customers • The Register

Software-for-services providers business Kaseya has obtained a "universal decryptor key" for the REvil ransomware and is delivering it to clients. A brief Thursday update...

Most Popular

‘Critical Severity’ Warning for Malware Embedded in Popular JavaScript Library

Security responders are scrambling this weekend to assess the damage from crypto-mining malware embedded in an npm package (JavaScript library) that counts close...

Popular NPM Package Hijacked to Publish Crypto-mining Malware

The U.S. Cybersecurity and Infrastructure Security Agency on Friday warned of crypto-mining malware embedded in "UAParser.js," a popular JavaScript NPM library with over...

Cisco Talos Intelligence Group – Comprehensive Threat Intelligence: Threat Roundup for October 15 to October 22

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Oct. 15 and Oct. 22. As with previous roundups, this post...

Recent Comments