News

News

  • June 28, 2016 28 Jun'16

    CSA report shows frustrations with security alerts, endpoint agents

    New Cloud Security Alliance research shows growing fatigue with security alerts and endpoint agents, as well as growing adoption of IaaS and positive signs for Microsoft Azure.

  • June 24, 2016 24 Jun'16

    IAM security heightened by cyberterrorism, nation-state attack concerns

    At the 2016 Cloud Identity Summit, security experts discussed how fears of nation-state attackers and APT groups are spurring a renewed focus on identity and access management.

  • June 07, 2016 07 Jun'16

    Frank Abagnale: No technology can beat a social engineering attack

    SearchCloudSecurity talks with Frank Abagnale of Catch Me If You Can fame about the dangers of cybercrime and his work with the FBI as well as a new security startup.

  • May 20, 2016 20 May'16

    RSA: Beware of ransomware attacks in the cloud

    RSA Security's Rashmi Knowles spoke with SearchCloudSecurity about how new ransomware attacks are targeting cloud service providers and what enterprises can do about it.

  • April 28, 2016 28 Apr'16

    Secure cloud hosting: Why taking ownership is crucial

    Chase Cunningham of Armor spoke with SearchCloudSecurity at RSA Conference 2016 about the value of secure cloud hosting services, threat intelligence and more.

  • Sponsored News

    • Improving and Accelerating DevOps Through Convergence

      In today’s business environment, software has become a critical differentiator in determining business success. A recent article in Harvard Business Review postulates that every business is a competitor on a software playing field, no matter what sector it is in. See More

    • Scale-Out Storage Simplifies Planning

      “Never run out of disk space” became the storage administrator’s prime directive because of the big difference between storage and the rest of an organization’s IT infrastructure. When the network guys slightly underestimate the bandwidth they’ll need to provide, the network gets congested and applications slow down. Similarly, if the server crew ends up running a few too many VMs on too few hosts, the VMs run slower. See More

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Choosing the Right Tools to Harness Big Data

      As the global business environment becomes more complex, IT departments must quickly figure out how to interact with, deliver and analyze the deluge of data from an ever-growing number of sources. For many organizations, harnessing the competitive power of the large data sets stored in their environments—known as big data—is leading the business strategy. See More

    View All Sponsored News
  • March 21, 2016 21 Mar'16

    Netskope awarded patent for cloud visibility, governance

    Netskope earned a patent for its CASB services delivery method, which intelligently "steers" enterprise traffic to cloud apps and applies security controls to those apps.

  • March 04, 2016 04 Mar'16

    CISOs discuss the value of cloud access security brokers

    Several CISOs discussed why cloud access security brokers are imperative to their respective enterprises during a panel discussion at RSA Conference 2016.

  • March 02, 2016 02 Mar'16

    CASBs gaining momentum at RSA Conference 2016

    Cloud access security brokers are dominating the cloud security conversation at this year's RSA Conference. Here's what vendors are saying about CASBs.

  • March 02, 2016 02 Mar'16

    Redundant cloud security controls creating headaches

    Trend Micro's Mark Nunnikhoven said enterprises are often forced to deploy distinct cloud security controls for each type of service they deploy, making security unmanageable.

  • March 01, 2016 01 Mar'16

    Cloud providers weigh in on iPhone backdoor debate

    During a panel discussion at RSA Conference 2016, representatives from top cloud providers such as Google and Microsoft discussed the legal battle between Apple and the FBI over encrypted data.

  • February 29, 2016 29 Feb'16

    Cloud malware leads to high-speed impact

    During the CSA Summit at At RSA’s 2016 Conference, Netskope warned how cloud synchronization services can spread malware infection throughout an enterprise.

  • February 10, 2016 10 Feb'16

    Insider edition: How to contain a cloud, and other cloud safety concerns

    Now that enterprise data is stored in clouds of all shapes and sizes, IT needs to provide more security options than ever. This ezine supplement focuses on the issue of cloud safety and zones in on three of the latest cloud developments and their ...

  • February 03, 2016 03 Feb'16

    Privacy Shield to replace Safe Harbor framework

    The EU and U.S. agree on Privacy Shield as the replacement for the Safe Harbor framework for transatlantic data flows, though questions remain over privacy protection details.

  • February 01, 2016 01 Feb'16

    Readers' top picks for cloud security products

    What companies and cloud security products do organizations consider when they see to reduce their cloud vulnerabilities?

  • January 28, 2016 28 Jan'16

    Industry group says FedRAMP certification process is 'broken'

    An advocacy group representing cloud providers such as Hewlett Packard Enterprise and IBM has criticized FedRAMP and called on the government to fix the cloud certification program.

-ADS BY GOOGLE

SearchSecurity

SearchCloudComputing

SearchAWS

SearchCloudApplications

SearchServerVirtualization

SearchVMware

ComputerWeekly

Close