- July 25, 2017
G Suite security faced similar issues to Amazon Web Services, as misconfigured access permissions could have exposed sensitive information from hundreds of Google Groups.
- July 19, 2017
Following a number of data leaks related to improper AWS S3 bucket policies, Amazon has begun sending warning emails to users with public permissions.
- February 14, 2017
At RSA Conference 2017, Tenable Network Security introduced a cloud-based vulnerability management platform called Tenable.io that allows users to import and export vulnerability data.
- February 13, 2017
At RSA Conference 2017, Skyhigh Networks explained how it expanded its cloud access security broker model to include IaaS platforms and custom enterprise applications.
- February 13, 2017
The Cloud Security Alliance unveiled new research at RSA Conference 2017 that shows custom enterprise applications are creating shadow cloud computing risks for organizations.
Sponsored by DellEMC - Is yours one of those organisations that has been on the sidelines for Windows 10 or has migrated only a portion of its user base? If so, your users and IT teams are missing out on a wide range of benefits — including improved security, greater performance, simplified operations and maintenance, and enhanced support for cloud environments. See More
Sponsored by Rackspace - Businesses must deliver a consistent high-value experience—or risk losing customers to someone who can. And they’re turning to big data technologies to help. With big data analytics, organizations can get to know their customers better, learn their habits and anticipate their needs to deliver a better customer experience. See More
Sponsored by Dell EMC - In today’s business environment, software has become a critical differentiator in determining business success. A recent article in Harvard Business Review postulates that every business is a competitor on a software playing field, no matter what sector it is in. See More
Sponsored by DellEMC - Security threats are becoming more advanced, targeted and sophisticated. Unfortunately, we see the results in the news regularly, with recent attacks such as WannaCry and Petya crippling organisations worldwide. Endpoints remain by far the No. 1 source of security breaches — for certain types of breaches, 95% occur at the endpoint. See More
- September 30, 2016
Microsoft's 'million-dollar bug detector' on offer in preview of Project Springfield, an Azure-based fuzz testing service announced at Ignite 2016.
- September 19, 2016
At its OpenWorld Conference in San Francisco, Oracle announced an agreement to acquire cloud access security broker startup Palerra to get into the CASB market.
- September 14, 2016
Netskope cloud report reveals growth in threat from cloud ransomware as infected enterprises average 26 files carrying malware, over half of infected files shared publicly.
- September 12, 2016
Cloud POS provider Lightspeed reports a 'security incident,' reminds customers to change passwords and developers to implement OAuth 2.0 for improved authentication.
- September 08, 2016
Phishing campaigns appear to be gearing up as email addresses and hashed passwords for more than 68 million Dropbox accounts circulate on dark web sites.
- September 01, 2016
Confirming that 68 million Dropbox passwords were exposed in 2012, the cloud provider continued to urge users to update their credentials and enable two-factor authentication.
- August 31, 2016
SearchCloudSecurity's interview with Ping Identity CEO Andre Durand explores how distributed ledgers can be used for identity and access management.
- August 30, 2016
Ping Identity CEO Andre Durand talks with SearchCloudSecurity about the benefits of identity as a service as well as the issues holding back greater enterprise adoption of IDaaS.
- August 30, 2016
Cloud storage provider warns longtime users that it's time to change Dropbox passwords, as a precaution, after discovering an old set of Dropbox credentials was exposed -- in 2012.
- August 08, 2016
At Black Hat 2016, Fireglass researchers demonstrated how attackers can take advantage of AWS account jumping and abuse CloudTrail to hide their presence.