The Latest News & Insights

Feb 14, 2025
CSS Extends Malware Scanning to Google Cloud Storage
Salt Lake City, February 14, 2025 – Cloud Storage Security (CSS), a leader in advanced threat detection for cloud storage, announced today that it has extended its award-winning malware protection to Google Cloud Storage complementing its current support for Azure Blob and the AWS suite of storage services.
Cloud Storage Security
Feb 12, 2025
Legal Tech Provider Meets a Scalable Solution to Data Security
A legal technology provider required a secure, scalable solution to protect sensitive legal data while ensuring compliance with CJIS, HIPAA, and SOC 2 standards. By deploying Cloud Storage Security’s Antivirus for Amazon S3, the company established real-time malware detection, secured high-volume data ingestion, and maintained data residency and regulatory control within its AWS environment.
Cloud Storage Security
Feb 12, 2025
Securing Sensitive Data at Scale: A Government Agency’s Uncompromisable Requirement
A national defense agency required a secure and scalable solution to safeguard sensitive data within its AWS infrastructure while maintaining strict compliance and operational efficiency. By implementing Cloud Storage Security’s Antivirus for Amazon S3, the agency established real-time malware detection, ensured seamless processing of terabytes of data, and upheld rigorous regulatory standards.
Cloud Storage SecurityJan 31, 2025
Why Project-Based Malware Protection is Inadequate
Data migration to the cloud accelerates each year. By 2025, over 100 zettabytes of data1 will be stored in some form of cloud storage resource. If your organization stores data in the cloud, you are likely aware of the security risks associated with cloud-based malware, misconfigurations, and other issues that result in data loss or compliance violations. Today, the vast majority of organizations focus their efforts exclusively on protecting their “most important” resources, like repositories with sensitive information. Meanwhile, many other repositories are left unprotected and undefended. While this might seem like a cost and time-saving approach, operating with a project-based security strategy instead of an inclusive, programmatic strategy is like locking your front door and never checking your back door, leaving your entire enterprise vulnerable to malware infiltration.
Cloud Storage SecurityJan 27, 2025
Building a Strategy to Secure Your Cloud Storage
Organizations continue to move their data to the cloud at increasing rates, year after year. While the types of data migrating to the cloud have stayed largely the same (social security numbers, credit card information, or other sensitive data), the threats to data stored in the cloud continue to evolve. To consider data truly protected, organizations must approach the unique challenges facing cloud storage with attention, research, and a willingness to invest in effective defenses.
Cloud Storage Security
Jan 17, 2025
Security Alert: Codefinger Ransomware Attacks Target Amazon S3 Users
A new ransomware campaign targeting Amazon Simple Storage Service (Amazon S3) users has been identified. Dubbed Codefinger, the attackers leverage compromised AWS credentials to access and encrypt the victim’s data in Amazon S3 via AWS server-side encryption with customer-provided keys (AWS SSE-C). Cloud Storage Security’s (CSS’s) threat laboratory, Casmer Labs, responded quickly and conducted extensive research covering the attack method, identifying possible victims, and comparing Codefinger attacks to other ransomware tactics. Casmer Labs concluded that these attacks are especially dangerous because after encryption has been completed, the data cannot be recovered without the attacker’s disclosure of the encryption key, which would theoretically be provided after the ransom has been paid.
Cloud Storage Security
Jan 15, 2025
Your Responsibilities and Data Security in the Cloud
If your organization leverages the Amazon Web Services (AWS) cloud, you have probably encountered the Shared Responsibility Model. This framework is distributed by AWS to delineate security and compliance responsibilities between themselves as the cloud provider and their customers as cloud users.
Cloud Storage Security
Jan 13, 2025
GuardDuty + CSS Antivirus: Combined Approach to Secure AWS Storage
Ingestion Methods and Attack Surface Modern organizations that leverage the cloud ingest data into storage from various sources. Some examples include: Customer data via web applications On-premises data via migration tools such as AWS DataSync Data transferred from partners utilizing managed file transfer (MFT) services like AWS Transfer Family
Cloud Storage SecurityJan 6, 2025
Storage Announcements from AWS re:Invent & Data Security Considerations
Amazon Web Services (AWS) continues to advance the capabilities of cloud storage with a range of new features and enhancements, each offering unique benefits to businesses leveraging the AWS platform. Announcements made in December 2024 at AWS re:Invent included Storage Browser for Amazon S3, Queryable Object Metadata, Amazon S3 Tables, FSx Intelligent-Tiering and Physical data transfer terminals. These enhancements reflect AWS’ ongoing innovation in data management and storage optimization.
Cloud Storage Security