Computer Security US Blog

Computer Security News and Insights

Cloud Storage Security Risks

Cloud Storage Security Risks: What's Actually Exposing You

The Misconfigured Bucket That Exposed 540 Million Records In 2019, researchers at UpGuard discovered that Facebook user data — over 540 million records — sat exposed on misconfigured Amazon S3 buckets maintained by third-party app developers. Nobody hacked anything. Nobody exploited a zero-day. The data was simply left open to the public

Carl B. Johnson Apr 22, 2025 8 min read
Securing Cloud Applications

Securing Cloud Applications: A Practical 2025 Guide

The Snowflake Breach Changed How I Think About Cloud Risk In mid-2024, threat actors compromised over 165 organizations by exploiting stolen credentials against Snowflake cloud accounts that lacked multi-factor authentication. Ticketmaster, AT&T, Santander — massive names, massive data losses. The root cause wasn't some exotic zero-day. It

Carl B. Johnson Apr 22, 2025 7 min read
SaaS Security Best Practices

SaaS Security Best Practices: A 2025 Field Guide

In January 2025, the Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive after threat actors exploited misconfigured SaaS environments across multiple federal agencies. The attackers didn't need sophisticated zero-day exploits. They walked in through overprivileged service accounts, dormant API tokens, and single-factor authentication — problems that every

Carl B. Johnson Apr 22, 2025 7 min read
Mobile Device Security Policy

Mobile Device Security Policy: What Yours Is Missing

A Single Stolen Phone Cost This Company $4.9 Million In 2023, a healthcare organization reported to the HHS that a single unencrypted mobile device — left in a rideshare — led to the exposure of over 100,000 patient records. The resulting HIPAA settlement, remediation costs, and reputational damage ran into

Carl B. Johnson Apr 22, 2025 7 min read
BYOD Security Risks

BYOD Security Risks: What's Really on Your Network

The Personal Phone That Took Down a Hospital Network In 2023, a nurse at a regional hospital plugged her personal phone into a workstation USB port to charge it. That phone carried malware picked up from a third-party app store. Within 72 hours, ransomware had encrypted patient records across three

Carl B. Johnson Apr 22, 2025 7 min read
Securing Employee Mobile Devices

Securing Employee Mobile Devices: A 2025 Field Guide

The Text Message That Cost One Company $40 Million In 2024, a sophisticated smishing campaign targeted employees at several major financial institutions. Threat actors sent SMS messages impersonating IT support, directing staff to fake login portals that harvested credentials and multi-factor authentication tokens. The attackers then used those stolen credentials

Carl B. Johnson Apr 20, 2025 7 min read