Skip to content
  • Home
  • CMMC Assessments
    • CMMC Level 1 Conformity Assessments
    • CMMC Level 2 Conformity Assessments
    • CMMC Level 3 Conformity Assessments
    • International CMMC Conformity Assessments
    • Joint Surveillance Voluntary Assessment (JSVA)
    • NIST SP 800-171 Conformity Assessments
    • CMMC Assessment FAQs
  • Consulting
    • Consulting Phase 1: Gap Assessment
    • Consulting Phase 2: Design & Plan
    • Consulting Phase 3: Remediation
    • Consulting Phase 4: Conformity Assessment Support
    • Information Security Assessments
    • CMMC FAQs
  • Resources
    • As the CMMC Churns
    • Understanding the Requirements
    • NIST SP 800-171 & CMMC Infographics and Whitepapers
    • NIST SP 800-171 & CMMC Templates
    • Glossary and Acronyms
  • Contact
  • About
    • C3PAO Operations
      • CMMC Level 2 Certification Appeals Policy
    • Legal
      • CMMC NDA
      • CMMC Level 2 Certification Services Terms
      • Privacy Policy
      • Terms of Use
    • NAICS, NIGP, & SIC Codes
    • News & Events
    • Matthew Titcombe
    • James Goepel

Capital One’s huge hack highlights cloud security risks

  1. Home
  2. Capital One’s huge hack highlights cloud security risks

Capital One’s huge hack highlights cloud security risks

By Matthew Titcombe|2020-02-16T13:10:09-05:00July 30th, 2019|Categories: News|Tags: 3rd Party Risk, advanced persistent threat, APT, cybersecurity, Information Security, Risk Management, supply chain|

Capital One’s huge hack highlights cloud security risks

Just days after meeting with Ms. Helen Robinson of the Colorado Springs Business Journal to discuss the risks of using Cloud Service Providers, the Capitol One breach occurred.

Helen highlights a key point in our conversation, “’You can’t say Google does all of your security,’ Titcombe said. ‘You can inherit controls for security from them only to a point.'”  In this case, the hacker was a former Amazon employee with insider knowledge of CapitolOne’s weaknesses.

Read More

Share This Content!

FacebookXLinkedInWhatsAppTumblrPinterestEmail

Related Posts

Peak InfoSec and Fathom Cyber Announce Strategic Partnership to Provide Comprehensive CMMC Support
Peak InfoSec and Fathom Cyber Announce Strategic Partnership to Provide Comprehensive CMMC Support
Gallery

Peak InfoSec and Fathom Cyber Announce Strategic Partnership to Provide Comprehensive CMMC Support

January 28th, 2025
1 June 2022 ||  Peak InfoSec is now an Authorized C3PAO Press Release
1 June 2022 || Peak InfoSec is now an Authorized C3PAO Press Release
Gallery

1 June 2022 || Peak InfoSec is now an Authorized C3PAO Press Release

June 1st, 2022
25 May 2022 ||  Peak InfoSec is now an Authorized C3PAO
25 May 2022 || Peak InfoSec is now an Authorized C3PAO
Gallery

25 May 2022 || Peak InfoSec is now an Authorized C3PAO

May 25th, 2022
Are your people raining data from the cloud?

Are your people raining data from the cloud?

July 26th, 2019
Two years after WannaCry, ransomware still kills businesses

Two years after WannaCry, ransomware still kills businesses

May 31st, 2019
© Copyright    |   Peak InfoSec LLC   |   All Rights Reserved   |   Privacy Policy   |   Powered by Mountain Air Marketing
Close Sliding Bar Area

Recent Posts

  • Peak InfoSec and Fathom Cyber Announce Strategic Partnership to Provide Comprehensive CMMC Support
  • External Service Provider (ESP) Compliance Business Risk Transfer
  • The CMMC Program–It’s Here!!!
  • 3.3.3, Review and update logged events

Social Contact

Page load link
Go to Top