セキュア データストレージ

AWS S3 Configuration Best Practice: Enable Server-Side Encryption

December 06, 2021 by Amir Gil
We’ve previously written about how using checklists can avoid configuration errors, which is a useful practice for data protection. Encryption is one of the most fundamental practices in data protection because it renders data unreadable...

AWS S3 Configuration Best Practice: Enable Bucket Versioning for Data Recovery

October 20, 2021 by Amir Gil
We’ve previously written about how using checklists can avoid cloud storage configuration errors, which is a useful practice for improving data protection.

AWS S3 Configuration Best Practice: Use HTTPS (TLS) to Protect Data in Transit

October 04, 2021 by Amir Gil
In our last blog we explored the history of pre-flight checklists to avoid catastrophic failures from human errors and misconfiguration. In this blog we’ll delve in-depth into a critical public cloud storage security check. A major AWS...

What Can Cybersecurity Learn from Aviation? The Value of Public Cloud Storage Security Checklists

September 14, 2021 by Amir Gil
In aviation, pilots use pre-flight checklists to avoid catastrophic failures from human errors and misconfiguration. In cybersecurity, there are major cloud storage breaches that constantly occur because of misconfiguration.

Ransomware First Aid - in 3 Words

July 23, 2021 by Amir Gil
The recent Kaseya (Supply chain) attack was analyzed from different angles and described as the worst cyber-attack ever executed in one day with an estimated ~50 MSP’s and ~1500 of their end customers affected.But is it really that...

Protect Cloud and On-premises Storage from malware and compliance violations with MetaDefender for Secure Storage v2.1.4 Release

July 15, 2021 by Nav Gill
Product Overview MetaDefender for Secure Storage offers a robust layer of protection for On-Prem and Cloud Storage. It protects enterprise stored data from data breaches, downtime, and compliance violations in cloud and on-premises...

For more information, please contact one of our critical infrastructure cybersecurity experts.

Sign up for Blog updates
Get information and insight from the leaders in advanced threat prevention.