channel company logo

Cloud Storage Security

Conversations about Data Security in Cloud Storage

At Cloud Storage Security, we pride ourselves on helping organizations across the globe prevent the spread of malware, locate sensitive data, and assess
their storage environments in order to extend data privacy, meet compliance requirements, and manage security mandates. Content on this chann
  • 2,308 Subscribers
  • 27 talks
  • 3 series

Conversations about Data Security in Cloud Storage

At Cloud Storage Security, we pride ourselves on helping organizations across the globe prevent the spread of malware, locate sensitive data, and assess
their storage environments in order to extend data privacy, meet compliance requirements, and manage security mandates. Content on this chann
  • 2,308 Subscribers
  • 27 talks
  • 3 series

Upcoming talks

Top Malware Threats of March 2025: What You Need to Know

Top Malware Threats of March 2025: What You Need to Know

Cloud Storage Security’s internal threat laboratory, Casmer Labs, has been hard at work discovering and identifying the most current and pressing threats to
organizations that operate in the cloud. In the first two months of 2025, infostealers such as Mirai dominated the charts as the most popular strains of
malware detected by our laboratory. However, in March, different manners of threats reared their ugly heads. Join us for this technical talk, where we will: …

On-demand talks

Data Security and PCI-DSS v4.0: How Your Organization Can Prepare for Compliance

Data Security and PCI-DSS v4.0: How Your Organization Can Prepare for Compliance

The vast majority of regulations contained within PCI-DSS v4.0 comes into effect on March 31, 2025. In order to better protect payment card information
(PAN), the Payment Card Industry council has introduced malware scanning requirements designed to protect data stored within the cloud. Join us for this
technical talk, where you will: Learn how to satisfy malware scanning requirements contained within PCI-DSS v4.0 Requirement 5 Learn how to co…

Top Malware Threats of February 2025: What You Need to Know

Top Malware Threats of February 2025: What You Need to Know

Cloud Storage Security’s internal threat laboratory, Casmer Labs, has been hard at work discovering and identifying the most current and pressing threats to
organizations that operate in the cloud. In February 2025, the top two most popular malware strains that Casmer Labs detected were Mirai, a well-known
botnet malware that targets IoT devices to launch DDoS attacks, and Prometei, a similarly dangerous botnet malware. Join us for this technical talk, where…

Top Malware Threats of January 2025: What You Need to Know

Top Malware Threats of January 2025: What You Need to Know

Cloud Storage Security’s internal threat laboratory, Casmer Labs, has been hard at work discovering and identifying the most current and pressing threats to
organizations that operate in the cloud. In January 2025, the top two most popular malware strains that Casmer Labs detected were SnakeKeyLogger, a
widely distributed infostealer targeting credentials, and RustyStealer, a sensitive data-harvesting Trojan. In this technical talk, put together for Solution Arc…

From Setup to Lockdown: A Complete Guide to Amazon S3 Security Configuration

From Setup to Lockdown: A Complete Guide to Amazon S3 Security Configuration

In 2024, a number of high-profile organizations experienced data breaches due to publicly accessible Amazon S3 buckets and 2025 is shaping up to be no
different. The problem that most organizations face is that implementing effective protection for Amazon S3 involves navigating a variety of access control
options. Whether you’re managing permissions through IAM roles, Access Control Lists (ACLs), or bucket policies, using the right tools and techniques for sp…

Building a Strategy to Secure Your Cloud Storage

Building a Strategy to Secure Your Cloud Storage

Year after year, more data moves into the cloud. While the physical state of data remains the same as it did on-premises, the inherent accessibility of the
cloud presents a unique set of challenges that require attention, research, time and monetary investment to address. By attending, you’ll learn: - Why
security for storage in the cloud is different from security for servers, networks, and endpoints - What a security strategy should include to protect cloud s…

Codefinger: A Ransomware Threat from Within

Codefinger: A Ransomware Threat from Within

A new ransomware campaign dubbed Codefinger is targeting Amazon S3 users.  What's notable about this approach is that the attackers leverage
compromised AWS credentials to access and encrypt the victim’s data via AWS server-side encryption with customer-provided keys. In this session from
Cloud Storage Security’s threat laboratory, Casmer Labs, learn how Codefinger works, including a simulation of the steps an attacker could take, and how t…

The Nastiest Threats to Cloud Storage in 2024 & What to Avoid in 2025

The Nastiest Threats to Cloud Storage in 2024 & What to Avoid in 2025

Ransomware strains, cyberattack strategies and threat actors are constantly evolving and 2024 was no different. While there are hundreds of ways your
cloud storage resources can be compromised, a few new developments in the last year have resulted in significant data breaches, substantial compliance
violations, and tens of millions of dollars in fines and reputational damage. Tune in to learn more about: - Major cloud storage security vulnerabilities, attac…

Ransomware Solutions and How We Can Help

Ransomware Solutions and How We Can Help

The fallout of a ransomware attack can be complex, costly and time-consuming. Prevention is key. Cloudticity and Cloud Storage Security provide guidance
and tooling, enabling you to take action. Tune in for an introduction to: - How to detect ransomware in cloud storage - How to detect ransomware in cloud
infrastructure - How to manage the cybersecurity life cycle

Series