www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-06-17T01:40:08+00:00 www.secnews.physaphae.fr CrowdStrike - CTI Society Les nouvelles capacités de crowdsstrike simplifient la sécurité du cloud hybride<br>New CrowdStrike Capabilities Simplify Hybrid Cloud Security CrowdStrike is excited to bring new capabilities to platform engineering and operations teams that manage hybrid cloud infrastructure, including on Red Hat Enterprise Linux and Red Hat OpenShift. Most organizations operate on hybrid cloud1, deployed to both private data centers and public clouds. In these environments, manageability and security can become challenging as the technology […]]]> 2024-05-16T16:17:21+00:00 https://www.crowdstrike.com/blog/new-crowdstrike-capabilities-simplify-hybrid-cloud-security/ www.secnews.physaphae.fr/article.php?IdArticle=8501643 False Cloud None 2.0000000000000000 CrowdStrike - CTI Society CrowdStrike améliore la visualisation des actifs du nuage pour accélérer la hiérarchisation des risques<br>CrowdStrike Enhances Cloud Asset Visualization to Accelerate Risk Prioritization The massive increase in cloud adoption has driven adversaries to focus their efforts on cloud environments - a shift that led to cloud intrusions increasing by 75% in 2023, emphasizing the need for stronger cloud security. Larger scale leads to larger risk. As organizations increase their quantity of cloud assets, their attack surface grows. Each […]]]> 2024-05-09T15:04:53+00:00 https://www.crowdstrike.com/blog/enhanced-cloud-asset-visualization/ www.secnews.physaphae.fr/article.php?IdArticle=8496639 False Cloud None 3.0000000000000000 CrowdStrike - CTI Society Crowdsstrike Cloud Security définit l'avenir d'un marché en évolution<br>CrowdStrike Cloud Security Defines the Future of an Evolving Market Today\'s businesses are building their future in the cloud. They rely on cloud infrastructure and services to operate, develop new products and deliver greater value to their customers. The cloud is the catalyst for digital transformation among organizations of all sizes and industries. But while the cloud powers immeasurable speed, growth and innovation, it also […]]]> 2024-05-06T15:19:05+00:00 https://www.crowdstrike.com/blog/cloud-security-defines-future-evolving-market/ www.secnews.physaphae.fr/article.php?IdArticle=8496640 False Cloud None 3.0000000000000000 CrowdStrike - CTI Society 5 meilleures pratiques pour sécuriser les ressources AWS<br>5 Best Practices to Secure AWS Resources Organizations are increasingly turning to cloud computing for IT agility, resilience and scalability. Amazon Web Services (AWS) stands at the forefront of this digital transformation, offering a robust, flexible and cost-effective platform that helps businesses drive growth and innovation.  However, as organizations migrate to the cloud, they face a complex and growing threat landscape of […]]]> 2024-04-22T17:03:13+00:00 https://www.crowdstrike.com/blog/best-practices-to-secure-aws-resources/ www.secnews.physaphae.fr/article.php?IdArticle=8486953 False Threat,Cloud None 3.0000000000000000 CrowdStrike - CTI Society Porter Airlines consolide ses nuages, son identité et sa sécurité de point final avec CrowdStrike<br>Porter Airlines Consolidates Its Cloud, Identity and Endpoint Security with CrowdStrike As Porter Airlines scaled its business, it needed a unified cybersecurity platform to eliminate the challenges of juggling multiple cloud, identity and endpoint security products. Porter consolidated its cybersecurity strategy with the single-agent, single-console architecture of the AI-native CrowdStrike Falcon® XDR platform. With the Falcon platform, the airline has reduced cost and complexity while driving […]]]> 2024-04-18T19:56:43+00:00 https://www.crowdstrike.com/blog/porter-airlines-consolidates-cybersecurity-with-crowdstrike/ www.secnews.physaphae.fr/article.php?IdArticle=8486954 False Cloud None 3.0000000000000000 CrowdStrike - CTI Society Crowdsstrike étend les capacités de sécurité de l'identité pour arrêter les attaques dans le cloud<br>CrowdStrike Extends Identity Security Capabilities to Stop Attacks in the Cloud Two recent Microsoft breaches underscore the growing problem of cloud identity attacks and why it’s critical to stop them.  While Microsoft Active Directory (AD) remains a prime target for attackers, cloud identity stores such as Microsoft Entra ID are also a target of opportunity. The reason is simple: Threat actors increasingly seek to mimic legitimate […]]]> 2024-04-10T17:00:52+00:00 https://www.crowdstrike.com/blog/identity-security-capabilities-stop-attacks-cloud/ www.secnews.physaphae.fr/article.php?IdArticle=8486960 False Threat,Cloud None 2.0000000000000000 CrowdStrike - CTI Society Crowdsstrike et Google Cloud développent un partenariat stratégique pour offrir une sécurité cloud unifiée<br>CrowdStrike and Google Cloud Expand Strategic Partnership to Deliver Unified Cloud Security CrowdStrike and Google Cloud today debuted an expanded strategic partnership with a series of announcements that demonstrate our ability to stop cloud breaches with industry-leading AI-powered protection. These new features and integrations are built to protect Google Cloud and multi-cloud customers against adversaries that are increasingly targeting cloud environments. At a time when cloud intrusions […]]]> 2024-04-09T11:52:21+00:00 https://www.crowdstrike.com/blog/crowdstrike-google-cloud-expand-strategic-partnership/ www.secnews.physaphae.fr/article.php?IdArticle=8486962 False Cloud None 2.0000000000000000 CrowdStrike - CTI Society CrowdStrike améliore les capacités de détection et de réponse des nuages (CDR) pour protéger le pipeline CI / CD<br>CrowdStrike Enhances Cloud Detection and Response (CDR) Capabilities to Protect CI/CD Pipeline The increase in cloud adoption has been met with a corresponding rise in cybersecurity threats. Cloud intrusions escalated by a staggering 75% in 2023, with cloud-conscious cases increasing by 110%. Amid this surge, eCrime adversaries have become the top threat actors targeting the cloud, accounting for 84% of adversary-attributed cloud-conscious intrusions.  For large enterprises that […]]]> 2024-03-21T16:54:15+00:00 https://www.crowdstrike.com/blog/crowdstrike-enhances-cdr-capabilities-for-cicd-pipeline/ www.secnews.physaphae.fr/article.php?IdArticle=8468502 False Threat,Cloud None 3.0000000000000000 CrowdStrike - CTI Society 5 meilleures pratiques pour sécuriser les ressources Azure<br>5 Best Practices to Secure Azure Resources Cloud computing has become the backbone for modern businesses due to its scalability, flexibility and cost-efficiency. As organizations choose cloud service providers to power their technological transformations, they must also properly secure their cloud environments to protect sensitive data, maintain privacy and comply with stringent regulatory requirements.  Today\'s organizations face the complex challenge of outpacing […]]]> 2024-03-18T14:15:05+00:00 https://www.crowdstrike.com/blog/azure-security-best-practices/ www.secnews.physaphae.fr/article.php?IdArticle=8466269 False Cloud None 3.0000000000000000 CrowdStrike - CTI Society Falcon Cloud Security prend en charge le pilote automatique GKE pour sécuriser plus de charges de travail GCP<br>Falcon Cloud Security Supports GKE Autopilot to Secure More GCP Workloads In the ever-evolving landscape of cloud security, staying ahead of the curve is paramount. Today, we are announcing an exciting enhancement: CrowdStrike Falcon® Cloud Security now supports Google Kubernetes Engine (GKE) Autopilot. This integration marks an important milestone in our commitment to providing cutting-edge DevSecOps-focused security and solutions for modern cloud environments. This new capability […]]]> 2024-03-07T16:47:17+00:00 https://www.crowdstrike.com/blog/falcon-cloud-security-supports-gke-autopilot-to-secure-more-gcp-workloads/ www.secnews.physaphae.fr/article.php?IdArticle=8463756 False Cloud None 3.0000000000000000 CrowdStrike - CTI Society Crowdsstrike pour acquérir la sécurité du flux, établit la norme pour la sécurité des données cloud moderne<br>CrowdStrike to Acquire Flow Security, Sets the Standard for Modern Cloud Data Security I\'m thrilled to announce CrowdStrike\'s agreement to acquire Flow Security, a pioneer in data security posture management (DSPM) and the industry\'s first and only cloud data runtime security solution. With this acquisition, CrowdStrike is setting the standard for modern cloud security with complete real-time data protection spanning endpoint and cloud environments, delivering the only cloud […]]]> 2024-03-05T21:07:02+00:00 https://www.crowdstrike.com/blog/crowdstrike-to-acquire-flow-security-redefines-modern-cloud-data-security/ www.secnews.physaphae.fr/article.php?IdArticle=8463757 False Cloud None 2.0000000000000000 CrowdStrike - CTI Society Résultats clés de CrowdStrike \\'s 2024 Rapport de sécurité des applications<br>Key Findings from CrowdStrike\\'s 2024 State of Application Security Report As organizations shift their applications and operations to the cloud and increasingly drive revenues through software, cloud-native applications and APIs have emerged among the greatest areas of modern security risk.  According to publicly available data, eight of the top 10 data breaches of 2023 were related to application attack surfaces.1 These eight breaches alone exposed […]]]> 2024-02-13T13:49:34+00:00 https://www.crowdstrike.com/blog/key-findings-crowdstrike-2024-state-of-application-security-report/ www.secnews.physaphae.fr/article.php?IdArticle=8449682 False Studies,Cloud None 4.0000000000000000 CrowdStrike - CTI Society Comment sécuriser les applications critiques d'entreprise<br>How to Secure Business-Critical Applications As organizations move more of their business-critical applications to the cloud, adversaries are shifting their tactics accordingly. And within the cloud, it\'s clear that cybercriminals are setting their sights on software applications: In fact, industry data shows 8 out of the top 10 breaches in 2023 were related to applications. The most valuable of these, […]]]> 2024-02-09T21:23:05+00:00 https://www.crowdstrike.com/blog/how-to-secure-business-critical-applications/ www.secnews.physaphae.fr/article.php?IdArticle=8449683 False Cloud None 3.0000000000000000 CrowdStrike - CTI Society Falcon Fund in Focus: Aembit renforce la sécurité pour l'accès à la charge de travail à la charge de travail<br>Falcon Fund in Focus: Aembit Strengthens Security for Workload-to-Workload Access The rise of distributed cloud services and the omnipresence of APIs has caused cloud-native application architecture to become highly fragmented. Enforcing secure access is a critical step in strengthening security as IT environments become more complex - but for many organizations, ensuring secure access across this evolving architecture is a constant challenge.  Existing secure access […]]]> 2024-01-30T20:11:34+00:00 https://www.crowdstrike.com/blog/aembit-strengthens-security-for-workload-to-workload-access/ www.secnews.physaphae.fr/article.php?IdArticle=8449688 False Cloud None 2.0000000000000000 CrowdStrike - CTI Society CrowdStrike a nommé un leader de Forrester Wave pour la sécurité de la charge de travail cloud<br>CrowdStrike Named a Leader in Forrester Wave for Cloud Workload Security Today, we\'re proud to announce that Forrester has named CrowdStrike a Leader in The Forrester Wave™: Cloud Workload Security, Q1 2024, stating “CrowdStrike shines in agentless CWP [cloud workload protection] and container runtime protection.” Forrester identified the 13 most significant vendors in cloud workload security and researched, analyzed and scored them based on the strengths […]]]> 2024-01-30T14:38:58+00:00 https://www.crowdstrike.com/blog/forrester-names-crowdstrike-a-leader-in-cloud-workload-security-q1-2024/ www.secnews.physaphae.fr/article.php?IdArticle=8449689 False Cloud,Commercial None 2.0000000000000000 CrowdStrike - CTI Society Au-delà de la conformité: sécurisez votre entreprise dans le cloud avec Falcon Cloud Security<br>Beyond Compliance: Secure Your Business in the Cloud with Falcon Cloud Security Cloud infrastructure is subject to a wide variety of international, federal, state and local security regulations. Organizations must comply with these regulations or face the consequences.  Due to the dynamic nature of cloud environments, maintaining consistent compliance for regulatory standards such as CIS, NIST, PCI DSS and SOC 2 benchmarks can be difficult, especially for […]]]> 2024-01-25T21:58:21+00:00 https://www.crowdstrike.com/blog/commercial-bank-of-california-cloud-compliance-and-data-security/ www.secnews.physaphae.fr/article.php?IdArticle=8449690 False Cloud None 2.0000000000000000 CrowdStrike - CTI Society CrowdStrike démontre le leadership de la sécurité du cloud chez AWS RE: Invent 2023<br>CrowdStrike Demonstrates Cloud Security Leadership at AWS re:Invent 2023 CrowdStrike is honored to be named Partner of the Year for several 2023 Geo and Global AWS Partner Awards at Amazon Web Services re:Invent 2023, where we are participating this year as a Diamond Sponsor. We are also proud to be a launch partner for AWS Built-in and achieve two AWS competencies. These accomplishments demonstrate […]]]> 2023-11-30T17:13:09+00:00 https://www.crowdstrike.com/blog/crowdstrike-demonstrated-cloud-security-leadership-aws-reinvent-2023/ www.secnews.physaphae.fr/article.php?IdArticle=8418333 False Cloud None 2.0000000000000000 CrowdStrike - CTI Society Sécuriser la flèche génératrice de l'IA: comment Coreweave utilise Crowdsstrike pour sécuriser son nuage haute performance<br>Securing the Generative AI Boom: How CoreWeave Uses CrowdStrike to Secure Its High-Performance Cloud CoreWeave is a specialized GPU cloud provider powering the AI revolution. It delivers the fastest and most consistent solutions for use cases that depend on GPU-accelerated workloads, including VFX, pixel streaming and generative AI.  CrowdStrike supports CoreWeave with a unified, AI-native cybersecurity platform, protecting  CoreWeave\'s architecture by stopping breaches. What follows is a summary of […]]]> 2023-11-13T16:35:34+00:00 https://www.crowdstrike.com/blog/how-coreweave-secures-cloud-with-crowdstrike/ www.secnews.physaphae.fr/article.php?IdArticle=8417526 False Cloud None 3.0000000000000000 CrowdStrike - CTI Society Permettre la prévention des violations sur le service d'ouvravis Red Hat sur AWS (ROSA)<br>Enabling Breach Prevention on Red Hat OpenShift Service on AWS (ROSA) As organizations increasingly deploy business-critical workloads to managed cloud services, enforcing strong security practices needs to be a top priority.  While many managed cloud service providers do a good job of protecting the cloud and infrastructure itself, it\'s the responsibility of the customer to protect what\'s running inside the cloud.  This is commonly known as […]]]> 2023-10-07T00:18:12+00:00 https://www.crowdstrike.com/blog/enable-breach-prevention-with-falcon-and-rosa/ www.secnews.physaphae.fr/article.php?IdArticle=8399749 False Cloud None 2.0000000000000000 CrowdStrike - CTI Society Trois façons d'améliorer la sécurité de votre cloud avec la gestion externe de la surface d'attaque<br>Three Ways to Enhance Your Cloud Security with External Attack Surface Management The IT future is a cloudy one. Organizations are increasingly relying on cloud servers, as today\'s IT environments use a combination of public and private clouds alongside on-premise infrastructure. Gartner® estimates that by 2026, 75% of organizations will adopt a digital transformation model predicated on the cloud as the fundamental underlying platform. Moreover, global spending […]]]> 2023-08-21T09:18:39+00:00 https://www.crowdstrike.com/blog/enhance-cloud-security-with-easm/ www.secnews.physaphae.fr/article.php?IdArticle=8372886 False Cloud None 2.0000000000000000 CrowdStrike - CTI Society Conseils de sécurité des lignes de première ligne de la réponse aux incidents du nuage<br>Security Guidance from the Front Lines of Cloud Incident Response In our first-ever Cloud Threat Summit, CrowdStrike\'s Senior Vice President of Intelligence and Senior Director of Consulting Services discussed the most common ways adversaries breach the cloud and the steps organizations can take to stay safe. An insightful and engaging conversation during last week\'s Cloud Threat Summit featured Adam Meyers, Senior Vice President of Intelligence, […]]]> 2023-06-15T19:21:14+00:00 https://www.crowdstrike.com/blog/cloud-security-incident-response-guidance/ www.secnews.physaphae.fr/article.php?IdArticle=8346220 False Threat,Cloud None 2.0000000000000000 CrowdStrike - CTI Society CrowdStrike définit l'avenir de la sécurité du cloud avec un XDR en un clic pour identifier automatiquement et sécuriser les actifs cloud non gérés<br>CrowdStrike Defines the Future of Cloud Security with One-Click XDR to Automatically Identify and Secure Unmanaged Cloud Assets CrowdStrike is defining the future of cloud security by empowering customers to rapidly understand their cloud risk and to detect, prevent and remediate cloud-focused threats. Today we are announcing a series of new cloud security innovations designed to deliver complete visibility into potential attack paths, from endpoint to cloud, and instantly secure vulnerable cloud workloads […]]]> 2023-06-06T11:11:47+00:00 https://www.crowdstrike.com/blog/cloud-security-one-click-xdr-innovation/ www.secnews.physaphae.fr/article.php?IdArticle=8346226 False Cloud None 2.0000000000000000 CrowdStrike - CTI Society 3 Ways Visualization Improves Cloud Asset Management and Security 2023-02-17T07:45:42+00:00 http://provinggrounds.cs.sys/blog/3-ways-visualization-improves-cloud-asset-management-and-security/ www.secnews.physaphae.fr/article.php?IdArticle=8313176 False Cloud None 3.0000000000000000