The Latest News & Insights

    blog post card image
    CSS Extends Malware Scanning to Google Cloud Storage

    Salt Lake City, February 14, 2025 – Cloud Storage Security (CSS), a leader in advanced threat detection for cloud storage, announced today that it has extended its award-winning malware protection to Google Cloud Storage complementing its current support for Azure Blob and the AWS suite of storage services.

    blog post card image
    Legal Tech Provider Meets a Scalable Solution to Data Security

    A legal technology provider required a secure, scalable solution to protect sensitive legal data while ensuring compliance with CJIS, HIPAA, and SOC 2 standards. By deploying Cloud Storage Security’s Antivirus for Amazon S3, the company established real-time malware detection, secured high-volume data ingestion, and maintained data residency and regulatory control within its AWS environment.

    blog post card image
    Securing Sensitive Data at Scale: A Government Agency’s Uncompromisable Requirement

    A national defense agency required a secure and scalable solution to safeguard sensitive data within its AWS infrastructure while maintaining strict compliance and operational efficiency. By implementing Cloud Storage Security’s Antivirus for Amazon S3, the agency established real-time malware detection, ensured seamless processing of terabytes of data, and upheld rigorous regulatory standards.

    Image of data in a storage facility to illustrate the importance of programmatic malware protection
    Why Project-Based Malware Protection is Inadequate

    Data migration to the cloud accelerates each year. By 2025, over 100 zettabytes of data1 will be stored in some form of cloud storage resource. If your organization stores data in the cloud, you are likely aware of the security risks associated with cloud-based malware, misconfigurations, and other issues that result in data loss or compliance violations. Today, the vast majority of organizations focus their efforts exclusively on protecting their “most important” resources, like repositories with sensitive information. Meanwhile, many other repositories are left unprotected and undefended. While this might seem like a cost and time-saving approach, operating with a project-based security strategy instead of an inclusive, programmatic strategy is like locking your front door and never checking your back door, leaving your entire enterprise vulnerable to malware infiltration.

    blog post card image
    Building a Strategy to Secure Your Cloud Storage

    Organizations continue to move their data to the cloud at increasing rates, year after year. While the types of data migrating to the cloud have stayed largely the same (social security numbers, credit card information, or other sensitive data), the threats to data stored in the cloud continue to evolve. To consider data truly protected, organizations must approach the unique challenges facing cloud storage with attention, research, and a willingness to invest in effective defenses.

    Image of code discussing Security Alert as it relates to Codefinger
    Security Alert: Codefinger Ransomware Attacks Target Amazon S3 Users

    A new ransomware campaign targeting Amazon Simple Storage Service (Amazon S3) users has been identified. Dubbed Codefinger, the attackers leverage compromised AWS credentials to access and encrypt the victim’s data in Amazon S3 via AWS server-side encryption with customer-provided keys (AWS SSE-C). Cloud Storage Security’s (CSS’s) threat laboratory, Casmer Labs, responded quickly and conducted extensive research covering the attack method, identifying possible victims, and comparing Codefinger attacks to other ransomware tactics. Casmer Labs concluded that these attacks are especially dangerous because after encryption has been completed, the data cannot be recovered without the attacker’s disclosure of the encryption key, which would theoretically be provided after the ransom has been paid.

    Image of data along cloud infrastructure. Views of the cloud and all connected devices or storage locations, highlighting the importance of understanding the Shared Responsibility Model
    Your Responsibilities and Data Security in the Cloud

    If your organization leverages the Amazon Web Services (AWS) cloud, you have probably encountered the Shared Responsibility Model. This framework is distributed by AWS to delineate security and compliance responsibilities between themselves as the cloud provider and their customers as cloud users.

    blog post card image
    GuardDuty + CSS Antivirus: Combined Approach to Secure AWS Storage

    Ingestion Methods and Attack Surface Modern organizations that leverage the cloud ingest data into storage from various sources. Some examples include: Customer data via web applications On-premises data via migration tools such as AWS DataSync Data transferred from partners utilizing managed file transfer (MFT) services like AWS Transfer Family

    Representation of data in the cloud to support a blog surrounding re:Invent in December 2024 and critical updates/announcements as they relate to Cloud Storage Security
    Storage Announcements from AWS re:Invent & Data Security Considerations

    Amazon Web Services (AWS) continues to advance the capabilities of cloud storage with a range of new features and enhancements, each offering unique benefits to businesses leveraging the AWS platform. Announcements made in December 2024 at AWS re:Invent included Storage Browser for Amazon S3, Queryable Object Metadata, Amazon S3 Tables, FSx Intelligent-Tiering and Physical data transfer terminals. These enhancements reflect AWS’ ongoing innovation in data management and storage optimization.

    angled bg image

    Tired of Reading?

    Want to watch something instead?

    watch video blog cta image 614x261