BLOG

The Latest News & Insights

    Working with public sector organizations to keep their AWS GovCloud Regions safe from malware
    Public Sector and Malware: How Can We Protect Our Cloud?

    Ranging from local governments to federal agencies, public sector organizations are increasingly putting data and applications in the cloud. Whether to streamline access, leverage variable capacity and anticipated security of cloud platforms, or decrease pressure on IT teams, transition to the cloud continues to grow. In its report, 10 Hotspots in State & Local Government Contracting for 2024, GovWin by Deltek, Inc. reported a 39% increase in bid requests from state and local governments for cloud service types including infrastructure-as-a-service, platform-as-a-service, software-as-a-service, and storage-as-a-service.

    How can I get malware scanning for AWS GovCloud regions
    Are You Doing Enough to Protect Data in AWS GovCloud Regions?

    As governments and agencies are increasingly moving sensitive and confidential information to secure cloud regions such as AWS GovCloud, it is essential to pay attention to security vulnerabilities that may exist despite the platform’s compliance with the complex cybersecurity requirements mandated by the U.S. government. One area that stands out is the lack of an embedded service for regular and persistent malware scanning within the GovCloud storage network. Malware protection for GovCloud regions is paramount for ensuring reliable and secure operations, and without it the risk of cyberattacks is very real and very high. Fortunately, there is one solution for AWS GovCloud in-tenant malware scanning in the AWS Marketplace. The CSS malware scanning service operates in parallel to workflows and can be configured for real-time scanning of static and moving data.

    Is it Worth it? Explore DIY Lambda & ClamAV Antivirus Solutions for S3
    When A DIY Lambda & ClamAV Antivirus Solution for S3 Isn't Worth It

    Cloud Storage Security's (CSS) malware protection solution was built when our founders observed that cloud application workflows that rely on cloud storage have become a massive attack vector, and that building an in-house, end-to-end, malware detection system with sophisticated threat detection engines was a costly undertaking for any business with data in the cloud. This is especially true for workflows that ingest third party files, store them in the cloud and then share them downstream.

    Data practices and implications for companies worldwide for cloud storage, S3 storage, and S3 malware scanning.
    Costly Consequences of Falling Asleep at the Security Wheel

    TechTarget’s Jill McKeon reported that the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) recently settled ransomware investigations involving two medical providers, in which the OCR issued civil monetary penalties totaling $490,000 for failing to fully comply with the HIPAA Security Rule by regularly and persistently maintaining malware prevention services.

    Image of Kevin Hunt next to the Cloud Storage Security logo and text introducing Kevin Hunt as their new Chief Technology Officer, helping to enhance S3 malware scanning.
    Cloud Storage Security Names Kevin Hunt as Chief Technology Officer

    Former Microsoft Technology Leader Will Oversee the Enhancement of the Company's Innovative Data Security Solutions

    Image of Cloud Storage Security and Four Inc Logos Paired with Public Sector Style Building in Background
    CSS and Four Inc. Expand Public Sector Access to Powerful Antimalware and DLP Solutions

    In-tenant cloud storage solutions are available through Four, Inc.'s AWS Storefront

    CSS Launches Unified Data Security Across Cloud Platforms

    New multi-cloud data security capability addresses need for unified management across AWS and Microsoft Azure

    Ransomware Protection and Defense: A Comprehensive Guide

    Ransomware attacks are among the most disruptive and costly cybersecurity incidents experienced by healthcare organizations and other businesses. Attackers see a tremendous opportunity to extract large sums of money by holding data hostage. And by preying on organizations that have valuable data, mission-critical systems, and insufficient defenses, these attackers too often succeed.

    Image of buildings in the financial services space each concerned about the impact of GenAI and Generative AI on their businesses
    Use Case: FinServ Company Protects GenAI Application Data

    A financial services company became aware of a critical need to secure their generative artificial intelligence (GenAI) models against malware infiltration. These models are used to efficiently process large amounts of unstructured financial data to deliver rapid quantitative and qualitative analysis across multiple business lines.

    Tired of Reading?

    Want to watch something instead?

    Website_Case_Studies_Watch_Video (3)