The Latest News & Insights

    What Is DSPM in Cyber Security and How to Choose the Right Cloud DSPM Platform
    What is DSPM in Cyber Security and How to Choose the Right Cloud DSPM Platform

    Year after year, more data moves into the cloud. In fact, this year, over 200 zettabytes of data have landed in cloud storage repositories. The nature of that data hasn’t changed — Social Security numbers, cardholder information, intellectual property — but the surface area and accessibility have. Cloud storage’s inherent convenience introduces new risks: attack paths, misconfigurations, insider behavior, and compliance gaps. These challenges demand attention not just with tools, but with architectural clarity and operational readiness. This piece explains what DSPM is, why it matters at the data layer, and what to look for without the buzzwords. TL;DR DSPM discovers and classifies sensitive data in cloud storage, validates storage controls, monitors risky activity, and delivers audit-ready, actor–time–object evidence. Use DSPM alongside CSPM, CNAPP, and DLP to close the blind spot across Amazon S3, EBS, EFS, FSx, and similar services. When evaluating DSPM tools, prioritize coverage depth, in-tenant architecture, ML-based anomaly detection, evidence quality, and predictable pricing.

    Malware protection for Amazon Elastic File System with Cloud Storage Security inside an AWS account
    Proactive Malware Protection for Amazon EFS with Cloud Storage Security

    TL:DR Cloud Storage Security brings malware protection to Amazon EFS by scanning files in place inside your AWS account with multiple engines. You can schedule or run on demand scans, apply tag quarantine or delete actions, and stream findings to CloudWatch and your SIEM without moving data outside your environment.

    blog post card image
    FTX Japan Breach Exposes 26M Records via Amazon S3 Error

    By late 2024 the public cloud had become the default platform for building and running new applications, business workflows, and data processing pipelines. Cloud adoption continued to accelerate through 2025. Industry forecasts place overall cloud spend in the hundreds of billions of dollars by the end of 2025. Analysts also estimate that more than one hundred zettabytes of data will reside in cloud infrastructure by the end of 2025, representing a significant portion of global digital data. As more workloads move, more data follows. Customer records, payment history, internal analytics output, compliance evidence, audit logs, and operational reports are all copied into cloud storage. That data does not live in a single place. It is replicated across object storage, snapshots, file systems, analytics buckets, and backup archives in multiple regions and accounts. Every storage location, for example an Amazon S3 bucket, an Azure Blob container, or a Google Cloud Storage bucket, has dozens of configuration options. A single misconfiguration can make internal data publicly reachable without any exploit.

    blog post card image
    Preventing Internal and External Data Breaches with DataDefender

    In the first half of 2025 Casmer Labs, Cloud Storage Security's internal threat research team, observed a steady increase in high impact data exposure and data theft incidents driven by insider activity, compromised access, and the lack of proactive activity monitoring.

    blog post card image
    Threat Report - July 2025

    Casmer Labs, Cloud Storage Security’s (CSS) internal threat laboratory, monitors the dynamic landscape of cybersecurity, cloud security, and particularly cloud data security. Our mission is to ensure that our customers and the public are informed about critical security developments, incidents, and updates.

    blog post card image
    Columbia University Expose 460GB of Sensitive Records in Targeted Hack

    Casmer Labs, Cloud Storage Security’s (CSS) internal threat research laboratory, closely monitors breaches and threats impacting cloud environments and particularly the data contained within. In this report, we analyze the June 2025 cyberattack on Columbia University —a significant breach against a higher education institution in terms of scope, impact, and complexity.

    June Threat Report
    June Threat Report: INTERPOL Attacks Infostealers

    Casmer Labs, Cloud Storage Security’s (CSS) internal threat laboratory, monitors the dynamic landscape of cybersecurity, cloud security, and particularly cloud data security. Our mission is to ensure that our customers and the public are informed about critical security developments, incidents, and updates.

    blog post card image
    Secure Amazon S3 with Advanced Access Control and Antivirus Scanning

    The typical enterprise organization stores high volumes of data in cloud storage services such as Amazon S3– with much of this data being sensitive or otherwise business critical in nature. Particularly for organizations who leverage data lakes built on Amazon S3, the sheer volume of data housed within one (or a few) individual storage resources is staggering. Scaling cloud infrastructure requires implementing proper access controls and comprehensive malware protection. These measures limit exposure to bad actors and unintended user mistakes, protecting against data breaches, system disruptions, and financial losses. Implementing these controls secures the cloud and helps achieve certifications like ISO 27001. Cloud Storage Security Antivirus for Amazon S3 enhances Amazon S3's native features, offering advanced antivirus scanning and malware protection.

    Managing Configurations at Scale with Datadefender
    Managing Misconfigurations at Scale With DataDefender

    Modern enterprises understand that their data stores are ever-growing– and becoming more distributed through more IT systems, accounts, resources, and more. An enterprise with hundreds of cloud accounts and thousands of buckets and volumes would have been a statistical anomaly 10 years ago. In 2025, cloud usage at this scale is commonplace.

    angled bg image

    Tired of Reading?

    Want to watch something instead?

    watch video blog cta image 614x261