17Apr
Status Report: SX Research Team Reveals New Cloud Security Threats
Stratus Report

In 2005, Gary McGraw and Brian Chess published a taxonomy of code vulnerabilities exploited by attackers.  Today, the “Seven Pernicious Kingdoms” continue to be used by MITRE to classify vulnerabilities. With the onset of cloud computing, it is time to begin a new taxonomy that accounts for attacks on cloud infrastructure.

Read More
05Apr
The ShieldX Serverless Security Philosophy
Technology

Serverless architecture, also known as Function as a Service (FaaS), presents new challenges for securing applications built using this architecture.  FaaS is an event-driven architecture in which a small piece of code is executed on an API call or message.  Various cloud vendors support multi-language (Java, Javascript, python, C#, etc.) FaaS to make it very easy for developers to use.  Additionally, FaaS is attractive for economy and maintenance reasons because the cost is based on the execution time and users don’t have to worry about regular maintenance of web-servers or shared resources. But the architecture introduces challenges in terms of how and where to enforce security controls.

Read More
20Mar
Hot off the Press – ShieldX Networks Selected as Finalist for RSA Conference 2018 Innovation Sandbox Contest!
Company News

 

We at ShieldX Networks are very thrilled to confirm that we have been selected as a finalist in the highly coveted RSA Sandbox Contest. The Innovation Sandbox Contest is an opportunity to spotlight new approaches to information security technology, provides advice and counsel for entrepreneurs, and exposes the RSA Conference community to venture capitalists, industry experts, senior level business practitioners, and thought leaders. Please read RSA’s announcement here:  https://www.businesswire.com/news/home/20180320005165/en/RSA-Conference-Announces-Finalists-2018-Innovation-Sandbox

Read More
12Dec
Cloud Security Without Compromise
Business

According to the Telegraph, “65% of large businesses reported a cyber breach or attack in the past 12 months. Yet nine out of 10 businesses don’t even have an incident management plan in the event of a cyber breach.”*

We are in the midst of an accelerating technology shift from traditional on-premise solutions to the cloud. As such, there is growing demand to secure migrating workloads, data and assets.  But do IT organizations have the right solutions and the will to catch up and meet this challenge head on?

Read More
07Dec
Buzzword Assimilation—Understanding the APEIRO Innovation
Technology

“More than 75% of businesses are planning to implement multi-cloud architectures within the next 2 years (2018–2019).” 1

 Yet “as much as 74%” of ESG surveyed professionals “abandon their traditional security controls because they are ineffective in the cloud environments” 2 they have – or are planning for.

THE INNOVATION

Since our inception, we’ve worked to create a security solution that natively secures today’s modern enterprise IT infrastructure. One that stops forcing IT teams to slow down performance, application development and cloud adoption, or face taking on more risk and cost. Our solution? The first containerized, microservices platform for multi-cloud security.

Read More
10Oct
Why You Need Advanced Micro-Segmentation to Combat Advanced Attacks
Technology

Just as we learned thirty years ago, access control alone is not a sufficient defense, by itself. Or, to put it another way, it’s déjà vu all over again! Just as the access control provided by those first firewalls in the 1980s was not enough to secure the perimeter, micro-segmentation based on access control alone does not adequately solve the problem of lateral movement inside the multi-cloud.

Read More
11Jul
(Not)Petya “X”: A Worm’s Evolution & Cyber Kill Chain
Threat Intelligence

WHAT YOU NEED TO KNOW

Petya and its “X” variants such as NotPetya, Nyetya, Petrwrap and GoldenEye have become a contagion. Represented in global daily headlines, they appear to be involved in an evolutionary process, starting as a primitive, network worm and ransomware and transforming into something of far greater destructive, possibly deceptive, power. While NATO investigates a state actor behind these attacks, NotPetya has already claimed over 2000 victims and £100m in cost to companies like Reckitt Benckiser.

Read More
16Jun
Micro-Segmentation Alone Is Not Enough
Business

Micro-segmentation has become a de facto standard and requirement to manage highly virtualized data centers and cloud computing environments. According to a recent article by Jon Oltsik, ESG senior principal analyst and founder of the firm’s cybersecurity service, ESG research has uncovered that in 2017, “68% of enterprise organizations use some type of software-based micro-segmentation technology.”*

Read More
16Jun
The Strategy Behind the Startup Madness
Business

Welcome to ShieldX and our Blog. This inaugural post provides insight into ShieldX, the company, its mission and how ShieldX is able to offer, within only 18 months, a validated, market-changing innovation with market-renowned recognition as a Gartner 2017 Cool Vendor in Cloud Security.

Read More

About Author

Ratinder Ahuja

Ratinder Ahuja

Founder & CEORatinder leads ShieldX and its mission as its central pivot point, drawing from a career as a successful serial entrepreneur and corporate leader, bringing with him his unique blend of business acumen, industry network and deep technical knowledge.
+ READ FULL BIO