News

News

  • February 03, 2016 03 Feb'16

    Privacy Shield to replace Safe Harbor framework

    The EU and U.S. agree on Privacy Shield as the replacement for the Safe Harbor framework for transatlantic data flows, though questions remain over privacy protection details.

  • February 01, 2016 01 Feb'16

    Readers' top picks for cloud security products

    What companies and cloud security products do organizations consider when they see to reduce their cloud vulnerabilities?

  • January 28, 2016 28 Jan'16

    Industry group says FedRAMP certification process is 'broken'

    An advocacy group representing cloud providers such as Hewlett Packard Enterprise and IBM has criticized FedRAMP and called on the government to fix the cloud certification program.

  • January 22, 2016 22 Jan'16

    LostPass security researcher questions LastPass responses

    The security researcher behind the LostPass phishing attack on LastPass has criticized the company's reaction and responses to his findings.

  • January 19, 2016 19 Jan'16

    'LostPass' phishing attack targets LastPass credentials

    A new proof-of-concept attack presented at ShmooCon 2016 exploits security weaknesses in cloud-based password manager LastPass and could allow attackers to gain control of users' accounts.

  • Sponsored News

    • Scale-Out Storage Simplifies Planning

      “Never run out of disk space” became the storage administrator’s prime directive because of the big difference between storage and the rest of an organization’s IT infrastructure. When the network guys slightly underestimate the bandwidth they’ll need to provide, the network gets congested and applications slow down. Similarly, if the server crew ends up running a few too many VMs on too few hosts, the VMs run slower. See More

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Empowering the Data-Driven Enterprise

      The key to a data-driven enterprise is to have access to all the relevant data across the entire organization. This isn’t as straightforward as it sounds. Legacy data warehousing and point analytics tools may not be capable of managing the vast and ever-growing mountains of data collected by a modern business. See More

    • Considerations for Deploying Hybrid Clouds on Microsoft® Azure™ and Cloud Platform

      To stay competitive, businesses must innovate and grow while improving time to market, increasing ROI and decreasing TCO. One of the biggest challenges in achieving these goals is growing complexity in the data center. In order to succeed in the new technology landscape, IT must embrace simplicity. Federating public and private cloud resources allows organizations to streamline IT services and run Microsoft workloads in the most optimized and appropriate environments. See More

    View All Sponsored News
  • January 13, 2016 13 Jan'16

    RSA president outlines cloud security strategy, IDaaS plans

    RSA President Amit Yoran discusses how the security vendor is changing its focus and explains how cloud security will play an important role in RSA's new strategy.

  • December 16, 2015 16 Dec'15

    Spy Banker Trojan takes advantage of Google cloud servers

    Security researchers at Zscaler discovered a new Spy Banker Trojan campaign that's leveraging Google's public cloud services as a hosting platform.

  • December 10, 2015 10 Dec'15

    Pulse Secure readying Cloud Secure offering

    Following its split from Juniper Networks, Pulse Secure looks to take on cloud access and authentication problems with a new product.

  • December 03, 2015 03 Dec'15

    Dropbox abused by APT group for spear phishing campaign

    FireEye researchers discovered an advanced persistent threat group that used Dropbox to launch a spear phishing campaign against Hong Kong media companies.

  • November 24, 2015 24 Nov'15

    Blue Coat merges CASBs with Web gateway security

    After acquiring two cloud access security brokers this year, Blue Coat Systems has united CASB capabilities with its Web gateway security technology under a new cloud security strategy.

  • November 10, 2015 10 Nov'15

    Blue Coat acquires Elastica in $280 million CASB deal

    After acquiring Perspecsys this summer, Blue Coat Systems makes another CASB deal for Elastica to further strengthen its cloud security presence.

  • November 06, 2015 06 Nov'15

    Dropbox Enterprise launches with new security features

    Dropbox stepped up its security offerings this week with the introduction of Dropbox Enterprise and several new cloud security controls for business customers.

  • October 30, 2015 30 Oct'15

    Xen hypervisor security flaw patched after seven years

    A critical Xen hypervisor security flaw that allows attackers to access host operating systems and had gone undiscovered for several years was finally patched this week.

  • October 28, 2015 28 Oct'15

    Intel pulls the plug on McAfee SaaS security products

    Intel Security unexpectedly moved several McAfee SaaS endpoint and email security products to end of life just prior to announcing a new corporate strategy this week.

  • October 23, 2015 23 Oct'15

    Government surveillance, cloud growth at an impasse

    The negative effects of U.S. government surveillance have put cloud providers in a tough spot and left security vendors scrambling for better privacy protections.

-ADS BY GOOGLE

SearchSecurity

SearchCloudComputing

SearchAWS

SearchCloudApplications

SearchServerVirtualization

SearchVMware

ComputerWeekly

Close