- January 17, 2018
Cloudflare takes inspiration from Google's BeyondCorp with a new service called Cloudflare Access, which aims to replace corporate VPNs and embrace perimeter-less security.
- November 28, 2017
In its first big post-Intel move, McAfee agreed to acquire Skyhigh Networks, a leading cloud access security broker, to strengthen its presence in the cloud security market.
- July 25, 2017
G Suite security faced similar issues to Amazon Web Services, as misconfigured access permissions could have exposed sensitive information from hundreds of Google Groups.
- July 19, 2017
Following a number of data leaks related to improper AWS S3 bucket policies, Amazon has begun sending warning emails to users with public permissions.
- February 14, 2017
At RSA Conference 2017, Tenable Network Security introduced a cloud-based vulnerability management platform called Tenable.io that allows users to import and export vulnerability data.
Sponsored by Iron Mountain - In just a few short years, ransomware has emerged as one of cybersecurity’s most dominant, persistent and treacherous threats. In 2016, ransomware payments reached more than $1 billion, according to the FBI, up from just $24 million paid in 2015. The spike in payments is increasing the velocity and variety of attacks exponentially: In 2017 ransomware on the dark market has grown by 2,500%. See More
Sponsored by Rackspace - Global organizations are expected to spend $1.2 trillion on digital transformation technologies in 2017, according to IDC. And going forward, this investment will grow to the tune of 18% a year, reaching $2 trillion in 2020. See More
Sponsored by NTT - Though the jury is still out over what constitutes successful digital transformation, there is no question about the immense excitement in this area as organizations seek to re-architect their IT environments to be more agile and responsive to modern business needs. See More
Sponsored by Dell EMC - Reduced costs is the No. 1 reason IT leaders are turning to hyper-converged infrastructure (HCI) as they strive to modernize their data centers, according to TechTarget Research. In a survey, nearly 50% of current users cited reduced cost as their top priority in deploying HCI, as did nearly 40% of prospective customers (see chart at bottom). See More
- February 13, 2017
At RSA Conference 2017, Skyhigh Networks explained how it expanded its cloud access security broker model to include IaaS platforms and custom enterprise applications.
- February 13, 2017
The Cloud Security Alliance unveiled new research at RSA Conference 2017 that shows custom enterprise applications are creating shadow cloud computing risks for organizations.
- September 30, 2016
Microsoft's 'million-dollar bug detector' on offer in preview of Project Springfield, an Azure-based fuzz testing service announced at Ignite 2016.
- September 19, 2016
At its OpenWorld Conference in San Francisco, Oracle announced an agreement to acquire cloud access security broker startup Palerra to get into the CASB market.
- September 14, 2016
Netskope cloud report reveals growth in threat from cloud ransomware as infected enterprises average 26 files carrying malware, over half of infected files shared publicly.
- September 12, 2016
Cloud POS provider Lightspeed reports a 'security incident,' reminds customers to change passwords and developers to implement OAuth 2.0 for improved authentication.
- September 08, 2016
Phishing campaigns appear to be gearing up as email addresses and hashed passwords for more than 68 million Dropbox accounts circulate on dark web sites.
- September 01, 2016
Confirming that 68 million Dropbox passwords were exposed in 2012, the cloud provider continued to urge users to update their credentials and enable two-factor authentication.
- August 31, 2016
SearchCloudSecurity's interview with Ping Identity CEO Andre Durand explores how distributed ledgers can be used for identity and access management.
- August 30, 2016
Ping Identity CEO Andre Durand talks with SearchCloudSecurity about the benefits of identity as a service as well as the issues holding back greater enterprise adoption of IDaaS.