RedLock is now a part of Palo Alto Networks - READ MORE
Menu
  • Solutions

    Compliance

    CIS Compliance

    GDPR Compliance

    HIPAA Compliance

    NIST Compliance

    PCI Compliance

    SOC 2 Compliance

    Initiatives

    Overview

    Challenge

    Compliance Assurance

    Security Governance

    Security Operations

    RedLock for Government

    Use Cases

    Asset Inventory

    Configuration Management

    Account Compromises & Insider Threats

    Network Security

    Host Security

    Incident Response

  • Platform
    • Security & Compliance for AWS
    • Security & Compliance for Microsoft Azure
    • Security & Compliance for Google Cloud
    • Technology
    • Integrations
  • Customers
  • Partners
  • Resources
  • Company
    • Leadership
    • CSI Team
    • News
    • Careers
    • Contact Us
  • Blog
  • Login
Blog

Blog

Cloud security insights, thoughts, and ideas.
  • Best Practices  Cloud Security  RedTalk

    RedTalk: Cloud Native Security vs 3rd Party Security

    by Matt Chiodi   |   10.10.18, 6:00 AM
    RedTalk: Cloud Native Security vs 3rd Party Security

    Customers often ask if they should use cloud-native security controls or invest in 3rd party solutions. The answer, of course, is not binary. When probed for the meaning of ‘3rd …

    Continue reading “RedTalk: Cloud Native Security vs 3rd Party Security”

    Read More
  • Product

    RedLock and Qualys Integration

    by Nataraj P   |   10.09.18, 6:00 AM
    Qualys Integration

    Earlier this year, RedLock announced support for host vulnerability insights through a technology partnership and integration with Tenable and AWS Inspector. We are now pleased to announce integration with Qualys, …

    Continue reading “RedLock and Qualys Integration”

    Read More
  • Company

    It’s Time to Bring Together Cloud Compliance and Security Analytics

    by Chris Morosco   |   10.03.18, 5:15 AM
    Palo Alto Networks + RedLock

    Today we announced our intent to acquire RedLock, a cloud threat defense company whose technology will add comprehensive asset discovery and automated threat detection and remediation to our public cloud …

    Continue reading “It’s Time to Bring Together Cloud Compliance and Security Analytics”

    Read More
  • Client Stories

    Mitigating Cloud Threats with Western Asset Management (WAM)

    by Michael Higashi   |   09.28.18, 10:20 AM
    Mitigating Cloud Threats with Western Asset Management (WAM)

     Banking, investment management and FinTech have continually invested in technology upgrades, data analytics and differentiated product offerings in an increasingly competitive and evolving investment landscape. A recent Accenture survey found …

    Continue reading “Mitigating Cloud Threats with Western Asset Management (WAM)”

    Read More
  • Client Stories

    Prologis Confidently Migrates to the Public Cloud with RedLock

    by Amy Heng   |   09.26.18, 10:20 AM
    Prologis Confidently Migrates to the Public Cloud with RedLock

    Prologis is the world’s largest owner and developer of warehouses and distribution centers with over $90 billion in assets under management. Through innovation and sustainability, they are listed as a …

    Continue reading “Prologis Confidently Migrates to the Public Cloud with RedLock”

    Read More
  • Client Stories

    Informatica Strengthens Security and DevOps Collaboration with RedLock

    by Amy Heng   |   09.25.18, 10:20 AM
    Informatica strengthens Security and DevOps Collaboration with RedLock

    For over 25 years, Informatica has helped their customers unleash the disruptive power of data. Once known as the data integration company, their position now as the leader in Enterprise …

    Continue reading “Informatica Strengthens Security and DevOps Collaboration with RedLock”

    Read More
  • Product

    RedLock Supports Industry’s First CIS Reporting for Google Cloud

    by Ankur Shah   |   09.24.18, 6:00 AM
    CIS Reporting for Google Cloud Security

    Over the last two years, I have had the opportunity to work with hundreds of customers to understand their key compliance and security requirements in public cloud environments. The consistent …

    Continue reading “RedLock Supports Industry’s First CIS Reporting for Google Cloud”

    Read More
  • RedTalk

    RedTalk: 7 Steps to Selecting Your Cloud Security Solution for AWS, Azure and Google Cloud

    by Michael Higashi   |   09.19.18, 6:00 AM
    RedTalk: 7 Steps to Selecting Your Cloud Security Solution for AWS, Azure and Google Cloud

     We recently sat down with RedLock’s VP of Solutions Engineering, Allan Kristensen. Allan’s 15+ years of experience building successful solutions engineering (SE) teams and his customer-first approach to build …

    Continue reading “RedTalk: 7 Steps to Selecting Your Cloud Security Solution for AWS, Azure and Google Cloud”

    Read More
  • Best Practices  Cloud Security

    AWS Security Tips: Understanding Access Controls in Amazon S3

    by Richard Vega   |   09.18.18, 6:00 AM
    AWS Security Tips: Understanding Access Controls in Amazon S3

    Managing access control in Amazon S3 continues to be a challenge for many companies. With the constant press surrounding organizations unintentionally exposing their objects in S3, It is important to …

    Continue reading “AWS Security Tips: Understanding Access Controls in Amazon S3”

    Read More
  • Best Practices  CISO Corner  Industry

    Top 10 Election Security Best Practices

    by Matt Chiodi   |   09.12.18, 6:00 AM
    election security blog

    At the heart of any democracy is the power of the individual voter. When the trust surrounding that system is called into question, the populace’s faith in that democracy begins …

    Continue reading “Top 10 Election Security Best Practices”

    Read More
  • Cloud Security

    13 Cloud Security Statistics To Know In 2019 (With 9 Best Practices)

    by Michael Higashi   |   09.11.18, 6:00 AM
    8 AWS Security Best Practices to Mitigate Security Risks Hero

    The phrase “in the cloud” has become a household phrase – nearly as common as “browsing the web” and “surfing the net”. Why has cloud technology become so important? Cloud …

    Continue reading “13 Cloud Security Statistics To Know In 2019 (With 9 Best Practices)”

    Read More
  • CISO Corner  Cloud Security

    Healthcare, Privacy & Cloud Security Risks

    by Matt Chiodi   |   09.06.18, 6:00 AM
    healthcare compliance in the cloud

    The threats to healthcare organizations are unique in that the value of what they’re trying to protect is significantly higher than other industries. From a purely monetary perspective, medical records, …

    Continue reading “Healthcare, Privacy & Cloud Security Risks”

    Read More
  • Cloud Security  RedTalk

    RedTalk: Cloud Security vs On-Premise Security What’s the Difference?

    by Matt Chiodi   |   08.30.18, 6:00 AM
    RedTalk: Cloud vs On-Premise Security What's the Difference?

     Understanding the differences between on-premise and cloud security matters because research shows public cloud security incidents to date have largely been the customer’s fault. While the debate use to …

    Continue reading “RedTalk: Cloud Security vs On-Premise Security What’s the Difference?”

    Read More
  • Best Practices  Cloud Security

    8 AWS Security Best Practices to Mitigate Security Risks

    by Michael Higashi   |   08.28.18, 6:00 AM
    aws security best practices

    There are a lot of benefits that come with having AWS services as your cloud platform, alone or as part of a hybrid or multicloud environment. The agility and flexibility …

    Continue reading “8 AWS Security Best Practices to Mitigate Security Risks”

    Read More
  • CISO Corner  Industry

    Apache Struts Seeking Another 15 Minutes of Fame

    by Matt Chiodi   |   08.24.18, 11:10 AM
    Apache Struts Seeking Another 15 Minutes of Fame

    Three words that should strike fear into the hearts of anyone is remote code execution (RCE). If an attacker is able to execute an RCE exploit on a vulnerable system, …

    Continue reading “Apache Struts Seeking Another 15 Minutes of Fame”

    Read More
  • Cloud Security  RedTalk

    RedTalk: Compliance in the Cloud

    by RedLock CSI Team   |   08.23.18, 6:00 AM
    RedTalk episode 6 - Compliance in the Cloud

     Compliance in the Cloud Auditors often ask abstract questions such as, “Are you ensuring that data at rest is encrypted in your cloud platforms?” However, what does that mean …

    Continue reading “RedTalk: Compliance in the Cloud”

    Read More
  • Best Practices  Cloud Security

    What You Must Know About AWS Security

    by Michael Higashi   |   08.21.18, 6:00 AM
    AWS Security

    Businesses and institutions are rapidly deploying their networks on the infrastructure of third-party cloud providers. In the first quarter of 2018, the cloud infrastructure services industry grew by 51%. It’s …

    Continue reading “What You Must Know About AWS Security”

    Read More
  • CISO Corner  Cloud Security

    L1 Terminal Fault (L1TF): Foreshadowing Your Next Move to Public Cloud

    by Matt Chiodi   |   08.15.18, 11:30 AM
    L1 Terminal Fault (L1TF)

    Customers still running a majority of their compute on-premise were given yet another reason to expedite their migrations to public cloud. On Tuesday Intel announced another wave of CPU flaws …

    Continue reading “L1 Terminal Fault (L1TF): Foreshadowing Your Next Move to Public Cloud”

    Read More
  • CISO Corner  Cloud Security

    How to Effectively Manage Multi-Cloud Security Challenges

    by Matt Chiodi   |   08.14.18, 6:00 AM
    Multi-Cloud Security Blog

    “Products provide some protection, but the only way to effectively do business in an insecure world is to put processes in place that recognize the inherent insecurity in the products. …

    Continue reading “How to Effectively Manage Multi-Cloud Security Challenges”

    Read More
  • Company

    1-1 with RedLock’s Head of Data Science, Alok Tongaonkar

    by Amy Heng   |   08.02.18, 7:30 AM

    RedLock’s Head of Data Science, Alok Tongaonkar, is passionate about applying machine learning to cyber security analytics and cloud threat defense. Prior to joining RedLock, Alok, was a Data Science …

    Continue reading “1-1 with RedLock’s Head of Data Science, Alok Tongaonkar”

    Read More
  • Industry  RedTalk

    RedTalk: Network Visualization

    by RedLock CSI Team   |   07.25.18, 6:00 AM
    RedTalk Ep 5: Network Visualization

      Have you ever been asked to find out if any of your databases are exposed to the internet? How do you go about doing this? A great place to …

    Continue reading “RedTalk: Network Visualization”

    Read More
  • Product

    RedLock’s Newest Innovations for Google Cloud Platform

    by Ankur Shah   |   07.23.18, 6:00 AM
    Google Next 18 PR Blog

    Google Cloud Next 2018 kicks-off today and, as a Google Cloud Platform partner, RedLock will be there in full force at booth S1431. We are announcing major enhancements to the RedLock …

    Continue reading “RedLock’s Newest Innovations for Google Cloud Platform”

    Read More
  • Product

    RedLock vs. CASB: Know Which Challenges You Are Trying to Solve

    by Varun Badhwar   |   07.17.18, 6:00 AM
    RedLock VS CASB

    Prior to founding RedLock, my co-founder and I spent years at an industry-leading Cloud Access Security Broker (CASB). When we first began thinking about RedLock’s initial product, we focused on …

    Continue reading “RedLock vs. CASB: Know Which Challenges You Are Trying to Solve”

    Read More
  • Industry

    The Booming Demand for HIPAA Compliance in the Cloud

    by Varun Badhwar   |   07.09.18, 6:00 AM
    HIPAA Compliance in the Cloud

    HIPAA Compliance Management in the cloud is easier than ever across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) environments.

    Read More
  • Cloud Security  Company

    The Business Case for Cloud Threat Defense

    by Varun Badhwar   |   06.26.18, 6:00 AM
    Business Case for Cloud Threat Defense

    Way back in October, 2015, Gartner predicted big things for cloud computing security when they boldly opined “Through 2020, 95 percent of cloud security failures will be the customer’s fault”. …

    Continue reading “The Business Case for Cloud Threat Defense”

    Read More
  • Product  RedTalk

    RedTalk: Discover, Detect, and Respond to Cloud Security Incidents Using an Extensible Language called RedLock Query Language (RQL)

    by Ankur Shah   |   06.21.18, 6:00 AM

    In order to provide comprehensive security and operational visibility across AWS, Azure, and Google Cloud Platform (GCP) environments and help organizations respond to cloud security incidents, the RedLock Cloud 360 …

    Continue reading “RedTalk: Discover, Detect, and Respond to Cloud Security Incidents Using an Extensible Language called RedLock Query Language (RQL)”

    Read More
  • Industry

    The Growing Need for a Configuration Management Database (CMDB) for Public Cloud

    by Varun Badhwar   |   06.13.18, 6:00 AM

    You can’t secure what you can’t see. Visibility into public cloud environments – the ability to view and manage assets that live in someone else’s physical space – is critical, …

    Continue reading “The Growing Need for a Configuration Management Database (CMDB) for Public Cloud”

    Read More
  • Cloud Security  RedTalk

    RedTalk: Network ACLs Behave Differently Amongst Public Cloud Providers

    by Gaurav Kumar   |   06.07.18, 6:00 AM
    RedTalk Ep 3: Network ACLs

    The Issue: Network ACLs Behave Differently Amongst Public Cloud Providers Not all firewalls are created equal. Some are generous… some are not…and not all firewall controls amongst the public cloud …

    Continue reading “RedTalk: Network ACLs Behave Differently Amongst Public Cloud Providers”

    Read More
  • Cloud Security

    GDPR Compliance Reporting in Public Cloud

    by Varun Badhwar   |   06.06.18, 6:00 AM
    GDPR Compliance with RedLock

    Even though the European Union’s General Data Protection Regulation (GDPR) is now in effect, discussions with RedLock customers and prospects indicates there are still many unanswered questions regarding who must …

    Continue reading “GDPR Compliance Reporting in Public Cloud”

    Read More
  • Best Practices  RedTalk

    RedTalk: Best Practices for Remediating Account Compromise Attacks

    by Alok Tongaonkar   |   05.24.18, 1:22 PM

    Account compromise attacks due to leaked access keys are typically remediated by deleting the compromised access keys. This is not sufficient as the attacker can create a covert channel to …

    Continue reading “RedTalk: Best Practices for Remediating Account Compromise Attacks”

    Read More
  • Best Practices

    Cloud Security Best Practices: Top 4 Tips for Preventing Network Intrusions in Public Cloud Computing Environments

    by Varun Badhwar   |   05.22.18, 6:05 AM

    Traditional network intrusion detection systems (NIDS) have long been a staple of on-premise security stacks. Deploying, managing and obtaining actionable results from these systems was often a big challenge. Now …

    Continue reading “Cloud Security Best Practices: Top 4 Tips for Preventing Network Intrusions in Public Cloud Computing Environments”

    Read More
  • Best Practices  Industry

    Cloud Security Best Practices: Top 4 Tips for Incident Response Teams

    by Varun Badhwar   |   05.17.18, 10:40 AM

    Reduced visibility and control. Cryptojacking. Stolen credentials. Pilfered access keys. Lost data. These are just some of the risks your organization may face when migrating to the cloud. While cloud computing …

    Continue reading “Cloud Security Best Practices: Top 4 Tips for Incident Response Teams”

    Read More
  • Research

    Instance Metadata API: A Modern Day Trojan Horse

    by Michael Higashi   |   05.15.18, 6:00 AM
    Instance Metadata API

    A while back, a researcher had reported that the Instance Metadata feature in public cloud platforms makes them a very effective exploitation target. Essentially, an instance’s metadata can be queried via …

    Continue reading “Instance Metadata API: A Modern Day Trojan Horse”

    Read More
  • Cloud Security  RedTalk  Research

    RedTalk: Privilege Escalation Through IAM Instance Profile Role

    by Gaurav Kumar   |   05.08.18, 8:00 AM
    Privilege Escalation Attacks

    In the first of our new video and blog series, RedTalk, we will discuss an interesting privilege escalation attack that could impact public cloud computing environments. Per wikipedia,

    Read More
  • Industry

    Cloud Computing Security Challenges: 5 Tips to Defend Against Account Compromises

    by Varun Badhwar   |   05.01.18, 1:16 PM

    Cloud computing account compromises, resulting from stolen access keys and credentials, happen more often than we know. We are all familiar with notable, newsworthy reports of account compromises. But for …

    Continue reading “Cloud Computing Security Challenges: 5 Tips to Defend Against Account Compromises”

    Read More
  • Product

    RedLock Increases Network Visibility with Support for Microsoft Azure Network Watcher

    by Varun Badhwar   |   04.17.18, 5:59 AM

    In public cloud environments, resources can be created – and then retired – in a matter of minutes. Nothing is static, making the management and security of cloud resources an …

    Continue reading “RedLock Increases Network Visibility with Support for Microsoft Azure Network Watcher”

    Read More
  • Product

    RedLock & Barracuda Networks – Joining Forces to Deliver Cloud Threat Defense Based on NIST Cybersecurity Framework (CSF)

    by Varun Badhwar   |   04.16.18, 5:59 AM

    Researchers (most notably Chris Vickery) have discovered that a common misconfiguration in Amazon Simple Storage Service (Amazon S3) may expose sensitive enterprise data to unauthorized access. They were actively searching …

    Continue reading “RedLock & Barracuda Networks – Joining Forces to Deliver Cloud Threat Defense Based on NIST Cybersecurity Framework (CSF)”

    Read More
  • Company

    Tackling Public Cloud Security at RSA Conference

    by Michael Higashi   |   03.27.18, 7:11 PM

    Is securing your AWS, Azure, or Google Cloud environments top of mind? RedLock advises organizations on emerging cloud security issues such as cryptojacking, account compromise detection, compliance assurance, and vulnerability …

    Continue reading “Tackling Public Cloud Security at RSA Conference”

    Read More
  • Product

    RedLock Announces Support for New Cloud Security Command Center for Google Cloud Platform

    by Varun Badhwar   |   03.21.18, 6:32 AM

    Enterprise adoption of the cloud continues to ramp, with clears signs of acceleration in 2018. At RedLock, we meet daily with executives across different verticals to hear about their migration …

    Continue reading “RedLock Announces Support for New Cloud Security Command Center for Google Cloud Platform”

    Read More
  • Company

    Mitigating Cloud Security Risks Starts with Data — Ends with Context

    by Michael Higashi   |   02.28.18, 5:46 AM

    “The problem with data is that it says a lot, but it also says nothing.‘ – Sendhil Mullainathan, Professor of economics, Harvard

    Read More
  • Research

    Cloud Security Trends and Equipping your “PreCrime” Unit to Combat Tomorrow’s Cybercrime

    by RedLock CSI Team   |   02.22.18, 6:00 AM

    “Minority Report” officers behind the PreCrime police force reduced felonies by 99.8 percent, and by April 2054, Washington, D.C., and Northern Virginia were murder-free for five consecutive years. As far-fetched …

    Continue reading “Cloud Security Trends and Equipping your “PreCrime” Unit to Combat Tomorrow’s Cybercrime”

    Read More
  • Research

    Lessons from the Cryptojacking Attack at Tesla

    by RedLock CSI Team   |   02.20.18, 6:00 AM

    The Cryptojacking Epidemic A few months ago, the RedLock Cloud Security Intelligence (CSI) team found hundreds of Kubernetes administration consoles accessible over the internet without any password protection. 

    Read More
  • Product

    RedLock and Tenable.io Enhance AWS Security

    by Varun Badhwar   |   02.01.18, 4:53 PM

    One attribute that uniquely sets the RedLock Cloud 360™ platform apart from other solutions is the ability to ingest data from multiple, disparate sources to provide a unified view of …

    Continue reading “RedLock and Tenable.io Enhance AWS Security”

    Read More
  • Industry  Product

    “Meltdown” and “Spectre”: RedLock has you Protected

    by Varun Badhwar   |   01.17.18, 1:26 PM

    The recent disclosures of the Spectre and Meltdown vulnerabilities underscores the need for cloud computing customers to fulfill their role in the cloud shared responsibility model, embraced by AWS Security, Azure and …

    Continue reading ““Meltdown” and “Spectre”: RedLock has you Protected”

    Read More
  • Industry  Product

    Ensuring CIS, PCI, and HIPAA Compliance with RedLock

    by Varun Badhwar   |   12.14.17, 12:21 PM

    This blog was originally published as a guest post in the AWS Startups Blog. In just a few short years, cloud computing has literally changed the entire IT landscape. And …

    Continue reading “Ensuring CIS, PCI, and HIPAA Compliance with RedLock”

    Read More
  • Industry

    2017 Cloud Threat Defense Lessons Learned

    by Varun Badhwar   |   12.14.17, 11:38 AM

    Before founding RedLock, I spent over 10 years in cloud security – both as a practitioner at a leading cloud service provider, and later as a company builder at a …

    Continue reading “2017 Cloud Threat Defense Lessons Learned”

    Read More
  • Company  Product

    Protecting the AWS Access Keys to Your Kingdom

    by Richard Vega   |   12.04.17, 12:36 PM

    Is your organization looking to achieve cloud security and compliance assurance across your Amazon Web Services, Microsoft Azure, and/or Google Cloud environments? If so, access key anomaly detection and contextual …

    Continue reading “Protecting the AWS Access Keys to Your Kingdom”

    Read More
  • Cloud Security

    RedLock Bolsters Cloud Security with Amazon GuardDuty Integration

    by Ankur Shah   |   11.28.17, 9:54 PM

      With AWS re:Invent 2017 in full swing at Las Vegas, I am thrilled to announce that RedLock is a launch partner for Amazon GuardDuty, a new threat detection service …

    Continue reading “RedLock Bolsters Cloud Security with Amazon GuardDuty Integration”

    Read More
  • Cloud Security

    Vegas Re:Invented

    by Varun Badhwar   |   11.14.17, 10:09 PM

    Are you headed to AWS re:Invent? The RedLock team is hosting several events and you’re invited to join us! Already at the MGM Grand for security sessions? Schedule some time …

    Continue reading “Vegas Re:Invented”

    Read More
  • Research

    Cloud Security Trends: Winter is Coming

    by RedLock CSI Team   |   10.05.17, 6:00 AM

    RedLock CSI Team 10.05.17 6:00 AM   If you’re a Game of Thrones fan like us, you can probably recount a favorite battle or two that put you on pins …

    Continue reading “Cloud Security Trends: Winter is Coming”

    Read More
  • Research

    Money Doesn’t Grow on Trees, but it’s Growing in the Cloud

    by RedLock CSI Team   |   10.05.17, 5:59 AM

    The RedLock Cloud Security Intelligence (CSI) team had previously reported (refer to Public Cloud Infrastructure Security Trends May 2017 report) that hundreds of Kubernetes administration consoles are accessible over the …

    Continue reading “Money Doesn’t Grow on Trees, but it’s Growing in the Cloud”

    Read More
  • Best Practices  Cloud Security

    Security Best Practices for AWS Access Key Deletion

    by RedLock CSI Team   |   08.15.17, 2:37 PM

    Recent months have seen a number of high profile breaches such as the OneLogin breach that resulted from compromised access keys. In these instances, the affected organizations failed to meet …

    Continue reading “Security Best Practices for AWS Access Key Deletion”

    Read More
  • Research

    Google Groups Misconfiguration Security Advisory

    by RedLock CSI Team   |   07.24.17, 9:00 AM

    The RedLock CSI team discovered hundreds of Google Groups that have publicly exposed messages containing sensitive information. The Impact The Google Groups misconfiguration has led to the exposure of sensitive …

    Continue reading “Google Groups Misconfiguration Security Advisory”

    Read More
  • Research

    Docker Hub Security Advisory

    by RedLock CSI Team   |   07.18.17, 5:22 AM

    The RedLock CSI team found that many organizations have accidentally shared internal Docker images publicly. The Impact The misconfiguration has led to the exposure of source code and other sensitive …

    Continue reading “Docker Hub Security Advisory”

    Read More
  • Cloud Security

    3 Key Takeaways from AWS Community Day

    by Amy Heng   |   06.20.17, 11:20 PM

    Last week, the first AWS Community Day was held in San Francisco. Unlike most conferences that are sponsored by vendors, this free event was organized by AWS community leaders and …

    Continue reading “3 Key Takeaways from AWS Community Day”

    Read More
  • Cloud Security

    Misconfiguration Exposes 198 Million American Voter Records

    by Varun Badhwar   |   06.20.17, 12:26 AM

    During the 2016 election, the Republican National Committee (RNC) hired Deep Root Analytics (DRA) to analyze political voting behaviors of Americans. DRA is storing 25 terabytes of sensitive voter information …

    Continue reading “Misconfiguration Exposes 198 Million American Voter Records”

    Read More
  • Cloud Security

    Lessons from the OneLogin Breach

    by Gaurav Kumar   |   06.08.17, 2:05 PM

    Research has shown that people with the GG genotype are able to quickly learn from their mistakes. We are starting the “Cybersecurity GG Genotype” blog series where we will analyze breaches …

    Continue reading “Lessons from the OneLogin Breach”

    Read More
  • Research

    Cloud Security Trends and Preventing Cyberheists

    by Gaurav Kumar   |   05.24.17, 11:07 PM

    During one of my favorite scenes in Ocean’s Eleven, Saul Bloom asked Danny Ocean, “You expect us to just walk out the casino with millions of dollars on us?” Who …

    Continue reading “Cloud Security Trends and Preventing Cyberheists”

    Read More
  • Research

    AWS RDS / EBS Misconfiguration Advisory

    by RedLock CSI Team   |   05.24.17, 10:40 PM

    The RedLock security research team discovered a common misconfiguration in Amazon Relational Database Service (RDS) and Amazon Elastic Block Store (EBS) where snapshots have inadvertently been granted “public” access. This …

    Continue reading “AWS RDS / EBS Misconfiguration Advisory”

    Read More
  • Cloud Security

    Amazon S3 Misconfiguration Advisory

    by RedLock CSI Team   |   05.24.17, 10:21 PM

    Researchers (most notably Chris Vickery) have discovered that a common misconfiguration in Amazon Simple Storage Service (Amazon S3) may expose sensitive enterprise data to unauthorized access. They were actively searching …

    Continue reading “Amazon S3 Misconfiguration Advisory”

    Read More
  • Company

    42 and RedLock

    by Gaurav Kumar   |   05.24.17, 10:18 PM

    What is the answer to life? 42 What is the answer to cloud security? In September 2015, my co-founder, Varun met at a cafe in San Francisco to answer this …

    Continue reading “42 and RedLock”

    Read More

Subscribe to Blog Updates

RedLock needs the contact information you provide to us to send you weekly blog notifications. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

Recent Posts

  • RedTalk: Cloud Native Security vs 3rd Party Security
  • RedLock and Qualys Integration
  • It’s Time to Bring Together Cloud Compliance and Security Analytics
  • Mitigating Cloud Threats with Western Asset Management (WAM)
  • Prologis Confidently Migrates to the Public Cloud with RedLock

Post by Topic

Client Stories (3) CISO Corner (5) Company (7) Best Practices (9) RedTalk (9) Research (10) Industry (10) Product (12) Cloud Security (21)
  • RedLock Demo Demo
  • RedLock Free Risk Assessment Trial
  • RedLock Contact Us Contact
  • RedTalk: Cloud Native Security vs 3rd Party Security
    RedTalk: Cloud Native Security vs 3rd Party Security

    Customers often ask if they should use cloud-native security controls or invest in 3rd party solutions. The answer, of course, is not binary. When probed for the meaning of ‘3rd …

    Continue reading “RedTalk: Cloud Native Security vs 3rd Party Security”

    Matt Chiodi
    10.10.18, 6:00 AM
  • Solutions
    • Challenge
    • Compliance Assurance
    • Security Governance
    • SOC Enablement
  • Platform
    • Integrations
    • AWS Security & Compliance
    • Azure Security & Compliance
    • Google Cloud Security & Compliance
    • Technology
  • Customers
  • Partners
  • Resources
  • Company
    • Leadership
    • CSI Team
    • News
    • Careers
    • Security
  • Blog
 
 
 
 
 
RedLock and RedLock logo are registered US trademarks of RedLock Inc. RedLock Cloud 360 is a trademark of RedLock Inc. All other registered trademarks are the properties of their respective owners.
  • Privacy Policy | Terms
© 2018 RedLock Inc. All rights reserved.
  • Solutions
    • Compliance
      • GDPR Compliance
      • HIPAA Compliance
      • NIST Compliance
      • PCI Compliance
      • SOC 2 Compliance
    • Initiatives
      • Overview
      • Challenge
      • Compliance Assurance
      • Security Governance
      • Security Operations
      • RedLock for Government
    • Use Cases
      • Asset Inventory
      • Configuration Management
      • Account Compromises & Insider Threats
      • Network Security
      • Host Security
      • Incident Response
  • Platform
    • Security & Compliance for AWS
    • Security & Compliance for Microsoft Azure
    • Security & Compliance for Google Cloud
    • Technology
    • Integrations
  • Customers
  • Partners
  • Resources
  • Company
    • Leadership
    • CSI Team
    • News
    • Careers
    • Contact Us
  • Blog
  • Login