- August 08, 2016
At Black Hat 2016, Fireglass researchers demonstrated how attackers can take advantage of AWS account jumping and abuse CloudTrail to hide their presence.
- July 15, 2016
The U.S. Court of Appeals ruled in favor of Microsoft regarding a controversial email privacy case with the U.S. government that involves data stored in an offshore data center.
- July 13, 2016
Cloud apps and cloud customers face challenges in complying with the EU GDPR as the new data protection regulation is set to take effect in less than two years.
- June 30, 2016
Cisco made a big move to increase its cloud security business with a $293 million acquisition of CloudLock, a startup in the cloud access security broker space.
- June 28, 2016
New Cloud Security Alliance research shows growing fatigue with security alerts and endpoint agents, as well as growing adoption of IaaS and positive signs for Microsoft Azure.
Sponsored by Splunk - The use of containers is growing rapidly. In a June 2016 survey conducted by Cloud Foundry and ClearPath Strategies, 64% of respondents said they plan to mainstream the use of containers in the next year. As the use of containers proliferates, it is essential to address monitoring to improve the performance, usage and troubleshooting of containers. However, effective monitoring requires an analytics-driven approach that not only informs developers and operations of what’s happening, but also offers those teams the ability to dig into their container usage and performance data to gain actionable insight. See More
Sponsored by IBM - Midsize organizations have an enormous opportunity to leverage cloud computing to drive innovation and improve their competitive position. Cloud computing—whether private, hybrid or public—enables organizations to be far more agile while reducing IT costs and operational expenses. In addition, cloud models enable organizations to embrace the digital transformation necessary to remain competitive in the future. See More
Sponsored by Dell - In today’s business environment, software has become a critical differentiator in determining business success. A recent article in Harvard Business Review postulates that every business is a competitor on a software playing field, no matter what sector it is in. See More
Sponsored by Palo Alto - Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More
- June 24, 2016
At the 2016 Cloud Identity Summit, security experts discussed how fears of nation-state attackers and APT groups are spurring a renewed focus on identity and access management.
- June 07, 2016
SearchCloudSecurity talks with Frank Abagnale of Catch Me If You Can fame about the dangers of cybercrime and his work with the FBI as well as a new security startup.
- May 20, 2016
RSA Security's Rashmi Knowles spoke with SearchCloudSecurity about how new ransomware attacks are targeting cloud service providers and what enterprises can do about it.
- April 28, 2016
Chase Cunningham of Armor spoke with SearchCloudSecurity at RSA Conference 2016 about the value of secure cloud hosting services, threat intelligence and more.
- March 21, 2016
Netskope earned a patent for its CASB services delivery method, which intelligently "steers" enterprise traffic to cloud apps and applies security controls to those apps.
- March 04, 2016
Several CISOs discussed why cloud access security brokers are imperative to their respective enterprises during a panel discussion at RSA Conference 2016.
- March 02, 2016
Cloud access security brokers are dominating the cloud security conversation at this year's RSA Conference. Here's what vendors are saying about CASBs.
- March 02, 2016
Trend Micro's Mark Nunnikhoven said enterprises are often forced to deploy distinct cloud security controls for each type of service they deploy, making security unmanageable.
- March 01, 2016
During a panel discussion at RSA Conference 2016, representatives from top cloud providers such as Google and Microsoft discussed the legal battle between Apple and the FBI over encrypted data.
- February 29, 2016
During the CSA Summit at At RSA’s 2016 Conference, Netskope warned how cloud synchronization services can spread malware infection throughout an enterprise.