• Using WhatsApp on an older iPhone? Then take note
    www.digitaltrends.com
    An update to WhatsApp will reportedly end support for iPhone operating system versions prior to iOS 15.1, which Apple released in 2021. It means that anyone using WhatsApp on an iPhone 5s, iPhone 6, or iPhone 6 Plus will have to get a newer iPhone to continue using the messaging service, or ditch the app for another one.The good news is that theres plenty of time to decide upon a solution, as support for these older iPhones isnt set to end until May 5, 2025, according to WaBetaInfo, which first reported the development.Recommended VideosIf youre willing and able to swap your aging iPhone for one that can run iOS 15.1 or later, then youll be able to carry on using WhatsApp as usual. But before the support ends, be sure to back up your WhatsApp chats to the iCloud as then you can simply download them all to your new device. Meta-owned WhatsApp explains the simple steps that you need to take in a how-to guide on its website.RelatedAs 9to5Mac points out, theres still no official WhatsApp software for Apples iPad, but its currently conducting tests for a beta version among a limited number of users via Apples TestFlight service. It means that Mays update will see support end for the first-generation iPad Air, iPad mini 2, and iPad mini 3.Looking for a new iPhone so that you can continue using WhatsApp on iOS? Well, the most recent model that you can afford would be a good way to go, as support will last longer across not only WhatsApp, but all your apps as well as support of the device itself by Apple. Folks looking for a brand new iPhone with an attractive price tag might want to wait until March, when Apple is widely expected to launch the iPhone SE 4 featuring the SEs first all-glass display. The iPhone 14 and iPhone 15 are also still available from Apple, along with the companys newestPhone 16 models, though theyll set you back a tidy sum.Alternatively, you could just jump ship and explore Android, a mobile platform with a slew of affordable options and WhatsApp, too!Editors Recommendations
    0 Comments ·0 Shares ·106 Views
  • Star Wars: Skeleton Crew review: a wondrous space pirate adventure
    www.digitaltrends.com
    Star Wars: Skeleton Crew Score DetailsBased on its first three episodes, Star Wars: Skeleton Crew has the potential to be the exciting, fun new space adventure that fans have been waiting for.ProsA lightly fantastic toneCrisp, clean direction and VFX throughoutAn entertaining, intriguing central pirate storylineConsAn uneven premiereSome performances occasionally feel stiff and woodenA bold but not always successful mix of pastiche homage and original inventionThere has been a distressing lack of wonder in Lucasfilms recent Star Wars projects. In certain instances, like the refreshingly grounded Andor, this has felt both purposeful and considered. This absence has, however, felt accidental in shows like The Book of Boba Fett, The Acolyte, and Ahsoka, three projects that feel flat and trapped in their own dead air. The frustratingly limited imaginations of The Mandalorian season 3and Star Wars: Episode IX The Rise of Skywalker similarly robbed them of whatever fun they might have otherwise offered. The best thing you can, therefore, say about Skeleton Crew, Lucasfilms latest Disney+ offering, is that it is easily the most wondrous live-action Star Wars project in recent memory.Recommended VideosCreated by Christopher Ford and Spider-Man: No Way Home director Jon Watts, Skeleton Crew wears its debt to 1980s genre classics like E.T.and The Goonies unabashedly on its sleeve. Sometimes, its influences seem too obvious, as is the case when Watts and Ford try unsuccessfully in Skeleton Crews first episode to bring suburbs, school buses, and even gum into the Star Wars universe. Once it gets past its rough, Amblin-influenced pastiche of a premiere, though, Skeleton Crew expands into an imaginative, pulpy space pirate adventure the likes of which Lucasfilm has truly never produced before. And the results, at least in its second and third episodes, are equally encouraging and invigorating.Matt Kennedy / LucasfilmSkeleton Crew begins on the planet of At Attin, an idyllic, closed-off world where Wim (Ravi Cabot-Conyers), a young human obsessed with the Jedi, struggles to find a place for himself. Matters arent helped by the absenteeism of his workaholic father Wendle (Tunde Adebimpe), whose inability to give his son the attention he needs only makes Wim hold on even tighter to his Jedi dreams. When he stumbles upon the exterior entrance to a buried starship in the wilderness one day, Wims curiosity is immediately peaked. It isnt long before he and his nave friend Neel (Robert Timothy Smith) have made their way onboard the derelict ship alongside Fern (Ryan Kiera Armstrong), the rebellious daughter of a high-ranking At Attin official (The Banshees of Inisherins Kerry Condon), and her best friend KB (Kyriana Kratter).RelatedAn ill-judged push of a green button brings the buried starship back to life and sends the kids hurtling past At Attins atmospheric borders and into the deep reaches of a galaxy they have no idea how to navigate. They find an unexpected ally in the ships only remaining occupant, an old droid named SM-33 (perfectly voiced by Nick Frost), whose gravelly voice and desperate search for a captain suggest that Fern, Wim, KB, and Neel have found themselves trapped aboard a long-lost pirate ship. This possibility is quickly confirmed when SM-33 takes them to a starport that turns out to be a gathering place for bloodthirsty, greedy pirates who have no problem threatening and imprisoning a group of children.Its in the starports underground cells that the kids find themselves face to face with Jod Na Nawood (The Orders Jude Law), an enigmatic Force-user whose connection to the galaxys long-fallen Jedi Order is as unclear as his trustworthiness. Skeleton Crew, which was written entirely by Ford, Watts, and Myung Joh Wesner, throws in even more delightful space-pirate touches when it goes on to refer to Laws Jod by multiple other names, the most memorable of which turns out to be Crimson Jack. The characters introduction, confidently played by Law, gives Skeleton Crew another jolt of life shortly following the sudden, exciting expansion of its scope and story that comes at the end of its premiere. Its first installment struggles to convincingly blend Skeleton Crews Amblin influences and its Star Wars setting, but the series second and third entries more than make up for its uneven start.LucasfilmSkeleton Crew works best not when its taking pages out of Americana sci-fi adventures like E.T. but when it is fully embracing the more lightly fantastical, Treasure Island and Goonies-inspired possibilities of its story. Thats evident in the series second and third installments, which are helmed by The Green Knight director David Lowery and are more fun and imaginative than any episode of television Lucasfilm has produced since at the very least Andors The Eye. These episodes pack in enough world-building details to make Skeleton Crews pirate underworld feel immediately fleshed-out and lived-in, and they do so without disrupting the shows pleasingly brisk pace and crackling, light-on-its-feet charm. Lowery has previously proven himself uniquely capable of bringing his own, distinct visual artistry to familiar worlds and IP titles, and he does so again here.That is, thankfully, a trait that Lowery shares with the rest of the series directors, which include Watts, Everything Everywhere All at Once filmmakers Daniel Scheinert and Daniel Kwan, Thunderbolts helmer Jake Schreier, The Mandalorian veteran Bryce Dallas Howard, and Twisters director Lee Isaac Chung. Skeleton Crew boasts undoubtedly the most impressive director lineup of any of Lucasfilms Disney+ titles to date, and that suggests that the series will be able to maintain the refreshingly polished look of its first three episodes across all of its eight chapters. The show so far lacks any of the distractingly shoddy VFX moments or muddy Volume-provided backgrounds that have marred several of its franchises previous TV stories. It looks better than any other Star Wars show outside of Andor, and the time that went into bringing each of its sets and digital environments to life only makes it that much easier to lose yourself in Skeleton Crews immersive, swashbuckling galactic underworld.LucasfilmIt is entirely possible that Skeleton Crew will have fizzled and fallen apart by the time its reached its conclusion. It wouldnt be the first Star Wars entry in Lucasfilms Disney-owned era to do so. For now, though, the show has more immediate promise and charm than almost any other live-action Star Wars title that has come along in quite a few years. Its young leads give performances that are alternately stiff and endearingly vulnerable, and some of the arguments that break out between Cabot-Conyers stubborn Wim and Armstrongs bossy Fern may be too purposefully childish for some older viewers. Skeleton Crew itself, however, never veers too far into YA territory.It, instead, returns to the same fun-for-all-ages, pulp-magazine brew of lighthearted adventure and genuine heart that has been at the center of Star Wars ever since George Lucas first decided to combine his love of Flash Gordon comic strips with his admiration for Akira Kurosawa-directed samurai movies. At its best, its a series that has the sci-fi fantasy magic necessary to inspire awe, and while it pulls from multiple different, clearly identifiable sources, Skeleton Crew feels like the rare Star Wars adventure we havent actually seen before. It has the potential, in other words, to remind viewers why they fell in love with Star Wars in the first place.Star Wars: Skeleton Crew premieres December 2 on Disney+. New episodes premiere weekly at 6 p.m. on Tuesdays. Digital Trends was given early access to the series first three episodes.Editors Recommendations
    0 Comments ·0 Shares ·103 Views
  • Do Your Passwords Meet the Proposed New Federal Guidelines?
    www.wsj.com
    Proposed new standards want to make passwords securebut also more user-friendly.
    0 Comments ·0 Shares ·80 Views
  • Amazon Web Services CEO Promises Needle-Moving AI Updates
    www.wsj.com
    As the cloud-computing leader kicks off its re:Invent conference, Chief Executive Matt Garman says there is no end in sight to the artificial intelligence race.
    0 Comments ·0 Shares ·78 Views
  • Its Delicious. Its One Bite. ItsAlmost $25.
    www.wsj.com
    Restaurants offer a new range of tiny plates with high-end ingredients.
    0 Comments ·0 Shares ·79 Views
  • The Best TV Shows of 2024: Small-Screen Sophistication
    www.wsj.com
    Scattered across myriad channels and platforms, many of the years best seriesincluding Disclaimer, Babylon Berlin and The Penguinwere both smart and cinematic.
    0 Comments ·0 Shares ·78 Views
  • Cyber Monday cybers into view, and weve got all the cyber deals
    arstechnica.com
    I hope everyone survived the weekend shopping experience and no one was eaten by ravening bands of deal-hunting nomads as they trekked through Macy's, or whatever people who actually go outside on Black Friday have to endure. Things are mostly quiet here at the Ars Orbiting HQthe gift shop on the mess deck is still selling mugs and other merch, if anyone wants some Ars stuff!but the e-commerce communications panel is beeping and it says we've got more deals to show you guys for Cyber Monday!Cyber Monday is the thing that happens after Black Friday, where the deals keep going past the weekend and erupt into the next week, like some kind of out-of-control roller coaster of capitalism careening off the rails and into the crowd. Headphones! Power stations! Tablets! More board games! We've got so many things for you to buy!A couple of quick notes: First, we're going to continue updating this list throughout Monday as things change, so if you don't see anything that tickles your fancy right now, check back in a few hours! Additionally, although we're making every effort to keep our prices accurate, deals are constantly shifting around, and an item's actual price might have drifted from what we list. Caveat emptor and all that.Read full articleComments
    0 Comments ·0 Shares ·98 Views
  • Certain names make ChatGPT grind to a halt, and we know why
    arstechnica.com
    He who must not be prompted Certain names make ChatGPT grind to a halt, and we know why Filter resulting from subject of settled defamation lawsuit could cause trouble down the road. Benj Edwards Dec 2, 2024 5:22 pm | 63 A Spanner Wrench stuck between cog gear wheels. Credit: stocksnapper via Getty Images A Spanner Wrench stuck between cog gear wheels. Credit: stocksnapper via Getty Images Story textSizeSmallStandardLargeWidth *StandardWideLinksStandardOrange* Subscribers only Learn moreOpenAI's ChatGPT is more than just an AI language model with a fancy interface. It's a system consisting of a stack of AI models and content filters that make sure its outputs don't embarrass OpenAI or get the company into legal trouble when its bot occasionally makes up potentially harmful facts about people.Recently, that reality made the news when people discovered that the name "David Mayer" breaks ChatGPT. 404 Media also discovered that the names "Jonathan Zittrain" and "Jonathan Turley" caused ChatGPT to cut conversations short. And we know another name, likely the first, that started the practice last year: Brian Hood. More on that below.The chat-breaking behavior occurs consistently when users mention these names in any context, and it results from a hard-coded filter that puts the brakes on the AI model's output before returning it to the user. Credit: Benj Edwards When asked about these names, ChatGPT responds with "I'm unable to produce a response" or "There was an error generating a response" before terminating the chat session, according to Ars' testing. The names do not affect outputs using OpenAI's API systems or in the OpenAI Playground (a special site for developer testing).Here's a list of ChatGPT-breaking names found so far through a communal effort taking place on social media and Reddit. Just before publication, Ars noticed that OpenAI lifted the block on "David Mayer," allowing it to process the name, so it is not included:Brian HoodJonathan TurleyJonathan ZittrainDavid FaberGuido ScorzaOpenAI did not respond to our request for comment about the names, but all of them are likely filtered due to complaints about ChatGPT's tendency to confabulate erroneous responses when lacking sufficient information about a person.The blocks add to ChatGPT's known restrictions, which include preventing users from asking it to repeat text "forever"a technique Google researchers used to extract training data in November 2023.Why these names?We first discovered that ChatGPT choked on the name "Brian Hood" in mid-2023 while writing about his defamation lawsuit. In that lawsuit, the Australian mayor threatened to sue OpenAI after discovering ChatGPT falsely claimed he had been imprisoned for bribery when, in fact, he was a whistleblower who had exposed corporate misconduct.The case was ultimately resolved in April 2023 when OpenAI agreed to filter out the false statements within Hood's 28-day ultimatum. That is possibly when the first ChatGPT hard-coded name filter appeared.As for Jonathan Turley, a George Washington University Law School professor and Fox News contributor, 404 Media notes that he wrote about ChatGPT's earlier mishandling of his name in April 2023. The model had fabricated false claims about him, including a non-existent sexual harassment scandal that cited a Washington Post article that never existed. Turley told 404 Media he has not filed lawsuits against OpenAI and said the company never contacted him about the issue.Jonathan Zittrain, a Harvard Law School professor who studies Internet governance, recently published an article in The Atlantic about AI regulation and ChatGPT. While both professors' work appears in citations within The New York Times' copyright lawsuit against OpenAI, tests with other cited authors' names did not trigger similar errors. We also tested "Mark Walters," another person who filed a defamation suit against OpenAI in 2023, but it did not stop the chatbot's output.The "David Mayer" block in particular (now resolved) presents additional questions, first posed on Reddit on November 26, as multiple people share this name. Reddit users speculated about connections to David Mayer de Rothschild, though no evidence supports these theories.The problems with hard-coded filtersAllowing a certain name or phrase to always break ChatGPT outputs could cause a lot of trouble down the line for certain ChatGPT users, opening them up for adversarial attacks and limiting the usefulness of the system.Already, Scale AI prompt engineer Riley Goodside discovered how an attacker might interrupt a ChatGPT session using a visual prompt injection of the name "David Mayer" rendered in a light, barely legible font embedded in an image. When ChatGPT sees the image (in this case, a math equation), it stops, but the user might not understand why.The filter also means that it's likely that ChatGPT won't be able to answer questions about this article when browsing the web, such as through ChatGPT with Search. Someone could use that to potentially prevent ChatGPT from browsing and processing a website on purpose if they added a forbidden name to the site's text.And then there's the inconvenience factor. Preventing ChatGPT from mentioning or processing certain names like "David Mayer," which is likely a popular name shared by hundreds if not thousands of people, means that people who share that name will have a much tougher time using ChatGPT. Or, say, if you're a teacher and you have a student named David Mayer and you want help sorting a class list, ChatGPT would refuse the task.These are still very early days in AI assistants, LLMs, and chatbots. Their use has opened up numerous opportunities and vulnerabilities that people are still probing daily. How OpenAI might resolve these issues is still an open question.Benj EdwardsSenior AI ReporterBenj EdwardsSenior AI Reporter Benj Edwards is Ars Technica's Senior AI Reporter and founder of the site's dedicated AI beat in 2022. He's also a tech historian with almost two decades of experience. In his free time, he writes and records music, collects vintage computers, and enjoys nature. He lives in Raleigh, NC. 63 Comments
    0 Comments ·0 Shares ·97 Views
  • Clearing the Clouds Around the Shared Responsibility Model
    www.informationweek.com
    In the early days of cloud, confusion around the shared responsibility model abounded. It was common for customers to simply assume that putting their data in the cloud meant that data was secure with no effort on their end. Today, that misconception, while not entirely erased, is much less likely to trip enterprises up.Migration to the cloud continues and cloud maturity varies depending on the enterprise. Misconfigurations happen, as do breaches. In fact, the majority of breaches (82%) involved data in the cloud, according to IBMs Cost of a Data Breach Report 2023.As organizations increasingly embrace their use of multiple cloud services, threat actors will continue to target it. Understanding how cloud providers are responsible for the security of the cloud and how customers are responsible for security in the cloud can help enterprises avoid potential missteps.Who Is Responsible for What?The broad definition of the shared responsibility model means cloud service providers (CSPs) are in charge of securing the underlying infrastructure of the cloud. Data centers and physical networks are their responsibility. Customers are responsible for securing their environment and their data in the cloud.While that broad definition is widely accepted, there is room for nuance among the various CSPs. They view it the same broadly, and then, they view it differently when you get into specific services, Randy Armknecht, managing director, global cloud advisory at global consulting firm Protiviti, tells InformationWeek.Related:And CSPs offer a lot of different services. We have over 200 services so that bar of the customer side and AWS side does shift a little bit on a couple of the services, Clarke Rodgers, director of enterprise strategy at cloud computing company Amazon Web Services (AWS), says.Enterprise leaders need to dig into the documentation for each cloud service they use to understand their organizational responsibilities and to avoid potential gaps and misunderstandings.While there is a definite division of responsibilities, CSPs typically position themselves as partners eager to help their customers uphold their part of cloud security. The cloud service providers are very interested and invested in their customers understanding the model, says Armknecht.Google, for one, opts to refer to the shared responsibility model as one of shared fate. We step over that shared responsibility boundary, partner with our customers, and provide much more prescriptive guidance and capabilities and services and teams like mine, for example, to help them with that part of that responsibility model, explains Nick Godfrey, senior director and global head, office of the CISO at Google Cloud, Googles suite of cloud computing services.Related:Customer success is a common mantra among cloud providers, although the exact wording may be different. Cloud is just not a technology. Its ultimately a partnership for the enterprise with the provider, says Nataraj Nagaratnam, CTO for cloud security at technology company IBM.When Misunderstandings HappenBoth parties, customer and provider, have their security responsibilities, but misunderstandings can still arise. In the early days of cloud, the incorrect assumption of automatic security was one of the most common misconceptions enterprise leaders had around cloud. Cloud providers secure the cloud, so any data plunked in the cloud was automatically safe, right? Wrong.Once that customer decides to sign up for an account, start using AWS services, start putting data in there, it is their responsibility how they choose to configure our services to meet their specific security, compliance, and privacy needs, Rodgers explains.Cloud customers might also mistakenly make assumptions about compliance with regulations like PCI or HIPAA. Microsoft and AWS and others have all of the configuration settings available and services available to be PCI compliant, but simply [putting] your data there does not make you compliant. You have to deliberately configure things to be compliant, says Armknecht.Related:Today, CSPs are much less likely to run into customers who make these kinds of assumptions. Over time, that misconception has definitely [been] reduced, but unfortunately, it has not gone away, says Nagaratnam.Even if customers fully understand their responsibilities, they may make mistakes when trying to fulfill them. Misconfigurations are a potential outcome for customers navigating cloud security. It is also possible for misconfigurations to occur on the cloud provider side.The CIA triad: confidentiality, integrity, and availability. Essentially a misconfiguration or a lack of configuration is going to put one of those things at risk, says Armknecht. Misconfigurations might result in issues like system outages or exploitable vulnerabilities.Cloud providers recognize that potential risk and aim help customers avoid that pitfall. We look really hard at providing layers of defense and multiple controls so that there is massively reduced likelihood of one misconfiguration causing that sort of nightmare scenario, says Godfrey.But misconfigurations do still happen. Where we find people having that misunderstanding is when it gets to the per service level, and I typically think it's a result of IT and development teams moving [too] fast, says Armknecht. They didn't go validate their assumption of the shared responsibility model for each service.Talking Shared ResponsibilityHow should customers talk to their CSPs about shared responsibility?I would absolutely look at the nature of the support and services that the CSP provides to the customer. I would ask questions around their philosophy and approach to secure [by] default and secure by design principles, says Godfrey. I would ask about the support in terms of providing foundations and blueprints and guidance to enable the customer to not have to figure everything out themselves.Conversations around expectations and available support can provide enterprise customers with more clarity. Once armed with that knowledge, enterprise teams -- often led by the coordinated efforts of the CIO, CTO, and CISO -- need to put in the internal work of upholding their cloud security responsibilities.There's often a tendency to assume that the relationship between the CISO and the CTO or the CIO is adversarial or challenged because they want different things, says Godfrey. We actually think they probably want exactly the same things, which is a secure and resilient cloud that enables the business to do business of the speed it wants to do it with all of the agility that the cloud has the potential to offer.Depending on the maturity of the organization, it may or may not have those roles filled or the resources to properly manage the shared responsibilities associated with the cloud.Not all customers are the same. They don't have the same resources. They don't have the same staffing or skill sets internally, says Rodgers. Customers might onboard an MSSP [managed security service provider] and use them while they're upskilling their own staff and then eventually sort of wean off the MSSP as they gain more familiarity and functionality inside of AWS.Multi-Cloud ComplexityAs enterprises increasingly leverage the benefits of the cloud, they may find it advantageous to work with different providers and adopt different services to support a variety of business functions. The majority of the customers that I meet with are using more than one cloud, or they're using SaaS services, Rodgers shares.Maintaining their half of the shared responsibility model can become more complicated for customers like that. Enterprise teams need to understand how their responsibilities shift, depending on the provider and the specific service. So, the team just has more to do; it's going to take longer, says Armknecht. He also points out that teams may understand one cloud environment but struggle with another. Maybe they misstep up on which controls are needed to meet their shared responsibility.While the complexities of multi-cloud and hybrid environments abound, there are some ways in which managing shared responsibility could become easier. Those responsibilities can be made much more addressable using technologies like AI and automation, Nagaratnam points out.As technology and risk continue to change, what will that mean for the shared responsibility model?I think the definitions of where the ... delineation actually technically sits will continue to evolve as cloud products continue to evolve, says Godfrey. But I don't think the shared responsibility model in that sort of contractual and legal delineation will go away.
    0 Comments ·0 Shares ·116 Views
  • The Cost of Cloud Misconfigurations: Preventing the Silent Threat
    www.informationweek.com
    Venkata Nedunoori, Associate Director, Dentsu InternationalDecember 2, 20244 Min ReadAleksia via Alamy StockCloud computing has revolutionized the way businesses operate, offering scalability, flexibility, and cost-efficiency. However, with this rapid adoption comes a new wave of challenges and most notably, the risk posed by cloud misconfigurations. These subtle yet significant errors can open doors to costly data breaches and compliance failures, often leaving businesses blindsided. Understanding the impact of cloud misconfigurations and implementing effective prevention strategies are crucial steps for organizations aiming to secure their cloud environments.The Growing Need for Cloud SecurityThe allure of cloud technology is undeniable, but its very design being an agile and adaptable infrastructure can also make it susceptible to human error. As more businesses transition to cloud-based services, the attack surface expands, increasing the risk of exposure due to misconfigured resources. A simple oversight, such as improperly set permissions or public-facing resources, can make sensitive data accessible to unauthorized users.Misconfigurations are not just minor slip-ups; they are often critical vulnerabilities that attackers seek out. According to industry reports, cloud misconfigurations account for a significant portion of data breaches. Gartner predicts that through 2025, 99% of cloud security failures will be the customers fault, primarily due to misconfigurations.Related:In 2017, there was a data breach involving a large US credit reporting agency. The breach, caused by a failure to patch a known vulnerability and improper cloud security settings, led to the exposure of personal information belonging to over 145 million consumers. The fallout included fines, lawsuits, and a significant loss of consumer trust.In June 2023, Toyota Motor Corporation disclosed that a cloud misconfiguration exposed vehicle data and customer information for over eight years, affecting approximately 260,000 customers.Similarly, a 2023 report by the Cloud Security Alliance highlighted that misconfigurations are a leading cause of cloud security incidents, with 75% of security failures resulting from inadequate management of identities, access, and privileges.These incidents demonstrate that cloud misconfigurations are not isolated events but a widespread issue with the potential to disrupt businesses across various industries.Prevention Techniques: Best Practices for Secure Cloud ConfigurationsTo mitigate the risk of cloud misconfigurations, businesses must adopt an energetic approach rooted in strong security practices. Below are key strategies to help organizations bolster their cloud security posture:Related:Adopt the principle of least privilege: One of the most fundamental security principles is limiting access to data and systems based on user roles. Implement role-based access controls (RBAC) to ensure that employees only have access to the resources they need to perform their job functions.Continuous monitoring and auditing: The dynamic nature of cloud environments requires ongoing vigilance. Utilize monitoring tools to track changes and audit logs for unusual activity. This real-time awareness can help detect misconfigurations before they are exploited.Automated configuration management: Manual configuration processes are prone to human error. Automation tools such as infrastructure as dode (IaC) solutions, like Terraform and Ansible, can help standardize and automate cloud configurations, minimizing the likelihood of mistakes.Security training and awareness: Equip the IT and security teams with regular training on cloud security best practices. The landscape of threats is constantly evolving, and up-to-date knowledge is essential for staying ahead of potential vulnerabilities.Encryption and data masking: Sensitive data should be encrypted both in transit and at rest. Implement data masking techniques where possible to reduce the risk associated with data exposure due to misconfigurations.Regular compliance checks: Ensure that the cloud environment aligns with industry standards such as CIS Benchmarks and frameworks like NIST and ISO 27001. Regular compliance checks can help identify gaps and fortify your security posture.Related:Tools to Strengthen Cloud SecurityLeveraging the right tools is essential for preventing cloud misconfigurations. Here are some notable options:Cloud security posture management (CSPM) Tools: CSPM solutions like Prisma Cloud and AWS Config help organizations monitor and remediate misconfigurations in real-time.Cloud workload protection platforms (CWPP): Tools such as Lacework and CrowdStrike Falcon offer comprehensive visibility into cloud workloads, allowing for better threat detection and response.IaC scanning tools: Solutions like Checkov and KICS scan IaC templates for security issues, ensuring that vulnerabilities are caught before deployment.Threat detection services: AWS GuardDuty and Azure Security Center provide advanced threat intelligence and automated alerts, enabling faster response to potential security incidents.Moving Forward: A Culture of SecurityPreventing cloud misconfigurations requires more than just technology. it mandates a culture of security within an organization. This means fostering cross-functional collaboration between IT, security, and development teams, emphasizing the importance of secure coding practices and adherence to security protocols.Cloud security is a shared responsibility. While cloud providers offer robust infrastructure and built-in tools to help secure data, the onus ultimately lies with businesses to configure and manage their environments properly. By implementing best practices, employing effective tools, and nurturing a security-first mindset, organizations can significantly reduce the risk of cloud misconfigurations and the costly repercussions that come with them.The era of cloud computing is here to stay. To thrive in this new landscape, businesses must remain vigilant and committed to safeguarding their digital assets against the silent threat of misconfigurations.About the AuthorVenkata NedunooriAssociate Director, Dentsu InternationalVenkata Nedunoori is a seasoned technology leader and IEEE Senior Member with experience across industries such as insurance, securities, airlines, and media. He specializes in designing and implementing advanced cloud-based solutions, focusing on scalable, secure, and cost-efficient platforms. A recognized speaker, Venkata is passionate about the intersection of cloud security and artificial intelligence, continually exploring ways to strengthen digital landscapes.See more from Venkata NedunooriNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also LikeReportsMore Reports
    0 Comments ·0 Shares ·116 Views