- April 28, 2016
Chase Cunningham of Armor spoke with SearchCloudSecurity at RSA Conference 2016 about the value of secure cloud hosting services, threat intelligence and more.
- March 21, 2016
Netskope earned a patent for its CASB services delivery method, which intelligently "steers" enterprise traffic to cloud apps and applies security controls to those apps.
- March 04, 2016
Several CISOs discussed why cloud access security brokers are imperative to their respective enterprises during a panel discussion at RSA Conference 2016.
- March 02, 2016
Cloud access security brokers are dominating the cloud security conversation at this year's RSA Conference. Here's what vendors are saying about CASBs.
- March 02, 2016
Trend Micro's Mark Nunnikhoven said enterprises are often forced to deploy distinct cloud security controls for each type of service they deploy, making security unmanageable.
Sponsored by SolidFire - “Never run out of disk space” became the storage administrator’s prime directive because of the big difference between storage and the rest of an organization’s IT infrastructure. When the network guys slightly underestimate the bandwidth they’ll need to provide, the network gets congested and applications slow down. Similarly, if the server crew ends up running a few too many VMs on too few hosts, the VMs run slower. See More
Sponsored by Dell - Bimodal IT is a new paradigm in development. Find out how it improves outcomes, and learn the first steps to making your organization a bimodal operation. See More
Sponsored by Palo Alto - Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More
Sponsored by Dell - As the global business environment becomes more complex, IT departments must quickly figure out how to interact with, deliver and analyze the deluge of data from an ever-growing number of sources. For many organizations, harnessing the competitive power of the large data sets stored in their environments—known as big data—is leading the business strategy. See More
- March 01, 2016
During a panel discussion at RSA Conference 2016, representatives from top cloud providers such as Google and Microsoft discussed the legal battle between Apple and the FBI over encrypted data.
- February 29, 2016
During the CSA Summit at At RSA’s 2016 Conference, Netskope warned how cloud synchronization services can spread malware infection throughout an enterprise.
- February 10, 2016
Now that enterprise data is stored in clouds of all shapes and sizes, IT needs to provide more security options than ever. This ezine supplement focuses on the issue of cloud safety and zones in on three of the latest cloud developments and their ...
- February 03, 2016
The EU and U.S. agree on Privacy Shield as the replacement for the Safe Harbor framework for transatlantic data flows, though questions remain over privacy protection details.
- February 01, 2016
What companies and cloud security products do organizations consider when they see to reduce their cloud vulnerabilities?
- January 28, 2016
An advocacy group representing cloud providers such as Hewlett Packard Enterprise and IBM has criticized FedRAMP and called on the government to fix the cloud certification program.
- January 22, 2016
The security researcher behind the LostPass phishing attack on LastPass has criticized the company's reaction and responses to his findings.
- January 19, 2016
A new proof-of-concept attack presented at ShmooCon 2016 exploits security weaknesses in cloud-based password manager LastPass and could allow attackers to gain control of users' accounts.
- January 13, 2016
RSA President Amit Yoran discusses how the security vendor is changing its focus and explains how cloud security will play an important role in RSA's new strategy.
- December 16, 2015
Security researchers at Zscaler discovered a new Spy Banker Trojan campaign that's leveraging Google's public cloud services as a hosting platform.