Blog

RedTalk: Discover, Detect, and Respond to Cloud Security Incidents Using an Extensible Language called RedLock Query Language (RQL)

In order to provide comprehensive security and operational visibility across AWS, Azure, and Google Cloud Platform (GCP) environments, the RedLock Cloud 360 platform ingests various services from...

Read More

Ankur Shah

06.21.18 6:00 AM

The Growing Need for a Configuration Management Database (CMDB) for Public Cloud

Comprehensive visibility into assets is a cloud computing security challenge across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) environments.

Read More

Varun Badhwar

06.13.18 6:00 AM

RedTalk: Network ACLs Behave Differently Amongst Public Cloud Providers

The Issue: Network ACLs Behave Differently Amongst Public Cloud Providers

Not all firewalls are created equal. Some are generous... some are not...and not all firewall controls amongst the public...

Read More

Gaurav Kumar

06.07.18 6:00 AM

GDPR Compliance in Public Cloud

Even though the European Union’s General Data Protection Regulation (GDPR) is now in effect, discussions with RedLock customers and prospects indicates there are still many unanswered questions...

Read More

Varun Badhwar

06.06.18 6:00 AM

RedTalk: Best Practices for Remediating Account Compromise Attacks

In the second episode of RedTalk, we discuss the best practices for remediating account compromise attacks.

Read More

Alok Tongaonkar

05.24.18 13:22 PM

Cloud Security Best Practices: Top 4 Tips for Preventing Network Intrusions in Public Cloud Computing Environments

Traditional network intrusion detection systems (NIDS) have long been a staple of on-premise security stacks. Deploying, managing and obtaining actionable results from these systems was often a...

Read More

Varun Badhwar

05.22.18 6:05 AM

Cloud Security Best Practices: Top 4 Tips for Incident Response Teams

Reduced visibility and control. Cryptojacking. Stolen credentials. Pilfered access keys. Lost data.

These are just some of the risks your organization may face when migrating to the cloud. While...

Read More

Varun Badhwar

05.17.18 10:40 AM

Instance Metadata API: A Modern Day Trojan Horse

A while back, a researcher had reported that the Instance Metadata feature in public cloud platforms makes them a very effective exploitation target. Essentially, an instance’s metadata can be...

Read More

Michael Higashi

05.15.18 6:00 AM

RedTalk: Privilege Escalation Through IAM Instance Profile Role

In the first of our new video and blog series, RedTalk, we will discuss an interesting privilege escalation attack that could impact public cloud computing environments. Per wikipedia,

Read More

Gaurav Kumar

05.08.18 8:00 AM

Cloud Computing Security Challenges: 5 Tips to Defend Against Account Compromises

Cloud computing account compromises, resulting from stolen access keys and credentials, happen more often than we know. We are all familiar with notable, newsworthy reports of account compromises....

Read More

Varun Badhwar

05.01.18 13:16 PM

Subscribe to Blog Updates

Recent Posts