The Latest News & Insights

    blog post card image
    PCI DSS v4.0.1-Compliant Financial Data Management

    In June 2024, the Payment Card Industry (PCI) Security Standards Council released version 4.0.1 of the PCI Data Security Standards (PCI DSS) detailing numerous best practices which organizations that store and process payment card information should implement. PCI DSS outlines the ways in which compliant organizations must store and process information, including when that data is stored on the cloud. With cloud storage and the popularity of online payments expanding, modern organizations must understand how they can remain compliant and trustworthy to end users and customers. As of April 1st, 2025, these new “best practices” become mandatory and are within scope of audit for continued compliance.

    blog post card image
    Security Alert: 14M shipping records accidentally leaked

    What Happened? HipShipper, a U.S.-based shipping service specializing in international e-commerce deliveries, suffered a significant data breach due to an improperly configured Amazon S3 bucket. The breach, discovered by researchers at Cybernews, exposed 14 million shipping labels containing sensitive customer information, including customer names, addresses, and contact information. The data was stored in a publicly accessible bucket, meaning anyone with internet access could view, exfiltrate, and exploit the information.

    blog post card image
    CSS Extends Malware Scanning to Google Cloud Storage

    Salt Lake City, February 14, 2025 – Cloud Storage Security (CSS), a leader in advanced threat detection for cloud storage, announced today that it has extended its award-winning malware protection to Google Cloud Storage complementing its current support for Azure Blob and the AWS suite of storage services.

    blog post card image
    Introducing Casmer Labs

    Salt Lake City, February 14, 2025 – Cloud Storage Security (CSS), a leader in advanced threat detection for cloud-native applications, today announced the launch of Casmer Labs, an internal research division dedicated to advancing cloud security. Casmer Labs is committed to enhancing public awareness of cloud storage security and identifying emerging threats across cloud, hybrid, and on-premises environments.

    blog post card image
    Legal Tech Provider Meets a Scalable Solution to Data Security

    A legal technology provider required a secure, scalable solution to protect sensitive legal data while ensuring compliance with CJIS, HIPAA, and SOC 2 standards. By deploying Cloud Storage Security’s Antivirus for Amazon S3, the company established real-time malware detection, secured high-volume data ingestion, and maintained data residency and regulatory control within its AWS environment.

    blog post card image
    Securing Sensitive Data at Scale: A Government Agency’s Uncompromisable Requirement

    A national defense agency required a secure and scalable solution to safeguard sensitive data within its AWS infrastructure while maintaining strict compliance and operational efficiency. By implementing Cloud Storage Security’s Antivirus for Amazon S3, the agency established real-time malware detection, ensured seamless processing of terabytes of data, and upheld rigorous regulatory standards.

    Casmer Labs exclusive: top malware of Jan 2025
    Top Three Malware Threats of January 2025: What You Need to Know

    As cyber threats continue to evolve, 2025 has already seen an uptick in malicious activity. Cloud Storage Security’s threat intelligence center, Casmer Labs, has identified several malware families standing out as significant risks to your cloud storage resources and downstream users of your data.

    Image of data in a storage facility to illustrate the importance of programmatic malware protection
    Why Project-Based Malware Protection is Inadequate

    Data migration to the cloud accelerates each year. By 2025, over 100 zettabytes of data1 will be stored in some form of cloud storage resource. If your organization stores data in the cloud, you are likely aware of the security risks associated with cloud-based malware, misconfigurations, and other issues that result in data loss or compliance violations. Today, the vast majority of organizations focus their efforts exclusively on protecting their “most important” resources, like repositories with sensitive information. Meanwhile, many other repositories are left unprotected and undefended. While this might seem like a cost and time-saving approach, operating with a project-based security strategy instead of an inclusive, programmatic strategy is like locking your front door and never checking your back door, leaving your entire enterprise vulnerable to malware infiltration.

    blog post card image
    Building a Strategy to Secure Your Cloud Storage

    Organizations continue to move their data to the cloud at increasing rates, year after year. While the types of data migrating to the cloud have stayed largely the same (social security numbers, credit card information, or other sensitive data), the threats to data stored in the cloud continue to evolve. To consider data truly protected, organizations must approach the unique challenges facing cloud storage with attention, research, and a willingness to invest in effective defenses.

    angled bg image

    Tired of Reading?

    Want to watch something instead?

    watch video blog cta image 614x261