BLOG
The Latest News & Insights
Oct 21, 2024
Public Sector and Malware: How Can We Protect Our Cloud?
Ranging from local governments to federal agencies, public sector organizations are increasingly putting data and applications in the cloud. Whether to streamline access, leverage variable capacity and anticipated security of cloud platforms, or decrease pressure on IT teams, transition to the cloud continues to grow. In its report, 10 Hotspots in State & Local Government Contracting for 2024, GovWin by Deltek, Inc. reported a 39% increase in bid requests from state and local governments for cloud service types including infrastructure-as-a-service, platform-as-a-service, software-as-a-service, and storage-as-a-service.
Cloud Storage SecurityOct 17, 2024
Are You Doing Enough to Protect Data in AWS GovCloud Regions?
As governments and agencies are increasingly moving sensitive and confidential information to secure cloud regions such as AWS GovCloud, it is essential to pay attention to security vulnerabilities that may exist despite the platform’s compliance with the complex cybersecurity requirements mandated by the U.S. government. One area that stands out is the lack of an embedded service for regular and persistent malware scanning within the GovCloud storage network. Malware protection for GovCloud regions is paramount for ensuring reliable and secure operations, and without it the risk of cyberattacks is very real and very high. Fortunately, there is one solution for AWS GovCloud in-tenant malware scanning in the AWS Marketplace. The CSS malware scanning service operates in parallel to workflows and can be configured for real-time scanning of static and moving data.
Cloud Storage SecurityOct 15, 2024
When A DIY Lambda & ClamAV Antivirus Solution for S3 Isn't Worth It
Cloud Storage Security's (CSS) malware protection solution was built when our founders observed that cloud application workflows that rely on cloud storage have become a massive attack vector, and that building an in-house, end-to-end, malware detection system with sophisticated threat detection engines was a costly undertaking for any business with data in the cloud. This is especially true for workflows that ingest third party files, store them in the cloud and then share them downstream.
Cloud Storage SecuritySep 4, 2024
CSS and Four Inc. Expand Public Sector Access to Powerful Antimalware and DLP Solutions
In-tenant cloud storage solutions are available through Four, Inc.'s AWS Storefront
Cloud Storage SecuritySep 4, 2024
CSS Launches Unified Data Security Across Cloud Platforms
New multi-cloud data security capability addresses need for unified management across AWS and Microsoft Azure
Cloud Storage SecurityAug 13, 2024
Ransomware Protection and Defense: A Comprehensive Guide
Ransomware attacks are among the most disruptive and costly cybersecurity incidents experienced by healthcare organizations and other businesses. Attackers see a tremendous opportunity to extract large sums of money by holding data hostage. And by preying on organizations that have valuable data, mission-critical systems, and insufficient defenses, these attackers too often succeed.
Cloud Storage Security & CloudticityJul 26, 2024
Use Case: FinServ Company Protects GenAI Application Data
A financial services company became aware of a critical need to secure their generative artificial intelligence (GenAI) models against malware infiltration. These models are used to efficiently process large amounts of unstructured financial data to deliver rapid quantitative and qualitative analysis across multiple business lines.
Cloud Storage SecurityJul 24, 2024
What's New: CSS Product Updates—Q2 '24
Cloud Storage Security (CSS) is always working to improve our users’ experience and we’re excited to share the following noteworthy improvements to our antivirus and data loss prevention solutions:
Cloud Storage SecurityJul 23, 2024
Identify and Mitigate Ransomware Threats in Healthcare
If cybercriminals have their way, you won’t know your healthcare organization has been attacked with ransomware until it’s too late. By the time they demand a sizable ransom, your highly sensitive patient data will already be encrypted, locking you out. You’ll need to shut down critical systems, curtail services, and set your emergency plan into motion.
Cloud Storage Security & Cloudticity