• April 13, 2017 13 Apr'17

    U.S. election hacking not an act of cyberwarfare, experts say

    The government needs a better definition for an act of cyberwarfare, says ex-CIA Director Michael Hayden, because he doesn't think the U.S. election hacking applies.

  • April 12, 2017 12 Apr'17

    Symantec CA woes debated by browser community

    Compliance with CA/B Forum Baseline Requirements was debated after Symantec CA posted responses to 14 issues raised by Mozilla developers.

  • April 12, 2017 12 Apr'17

    Security Update Guide brings growing pains to Patch Tuesday

    Microsoft fundamentally changes how IT pros will consume Patch Tuesday releases with the Security Update Guide and brings fixes for an actively exploited Word zero-day.

  • April 11, 2017 11 Apr'17

    CIA Vault 7 tools attributed to hacking group for years

    Security researchers said the CIA Vault 7 tools and techniques are linked to cyberattacks over the past six years targeting various foreign entities.

  • February 14, 2017 14 Feb'17

    Tenable launches cloud-based vulnerability management platform

    At RSA Conference 2017, Tenable Network Security introduced a cloud-based vulnerability management platform called that allows users to import and export vulnerability data.

  • Sponsored News

    • Dell/EMCの合併がコンバージドシステム市場に与える影響

      DellとEMCの合併が正式に完了した今、この合併は、コンバージドシステムの市場にどのような影響を与えるのでしょうか?コンバージェンス(統合)への需要は、合併前から着実に増大していました。IDCの予測によると、コンバージドシステムに対する支出総額は、2014年の82億ドルから2018年には175億ドルへと、年平均成長率21%ほどの拡大が見込まれています。 See More

    • When It Comes to Cloud Security, What You Don’t Know Can Hurt You

      One of the most important challenges for CIOs and CISOs is to gain visibility into their cloud security stance. If they can’t identify where security or compliance gaps exist, how can they be expected to put the proper controls and protections into place? See More

    • コンバージドシステムの新たな経済性を活用

      デジタル変革、そしてクラウドコンピューティング、モビリティ、ビッグデータアナリティクスなどの第三のプラットフォーム技術。これらの採用を推進するにあたり、ビジネス部門およびIT部門のリーダーは、ITインフラの導入や管理により組織のニーズにどう対処していくかをめぐって、新たな現実に直面することになります。データセンターはもはや、単なるバックオフィス業務を支えるものではなく、ビジネスの中枢であり、イノベーション、俊敏性、コストパフォーマンスを押し上げる重要な差別化要因といえます。 See More

    • Why You Need an Automated Approach to Cloud Security and Compliance

      Whether you are responsible for overall IT, IT security, DevOps or regulatory compliance, chances are public cloud services are an ever-growing part of your portfolio. This can be great for the business, enabling lower costs, greater agility and faster speed to market. But it can present new and difficult challenges in ensuring security and compliance. See More

    View All Sponsored News
  • February 13, 2017 13 Feb'17

    Skyhigh expands CASB model to IaaS platform protection, custom apps

    At RSA Conference 2017, Skyhigh Networks explained how it expanded its cloud access security broker model to include IaaS platforms and custom enterprise applications.

  • February 13, 2017 13 Feb'17

    CSA: Custom applications creating new 'shadow cloud' risks

    The Cloud Security Alliance unveiled new research at RSA Conference 2017 that shows custom enterprise applications are creating shadow cloud risks for organizations.

  • September 30, 2016 30 Sep'16

    Microsoft previews Project Springfield, Azure-based fuzz testing

    Microsoft's 'million-dollar bug detector' on offer in preview of Project Springfield, an Azure-based fuzz testing service announced at Ignite 2016.

  • September 19, 2016 19 Sep'16

    Oracle acquires cloud access security broker Palerra

    At its OpenWorld Conference in San Francisco, Oracle announced an agreement to acquire cloud access security broker startup Palerra to get into the CASB market.

  • September 14, 2016 14 Sep'16

    Cloud ransomware continues to rise, Netskope reports

    Netskope cloud report reveals growth in threat from cloud ransomware as infected enterprises average 26 files carrying malware, over half of infected files shared publicly.

  • September 12, 2016 12 Sep'16

    Cloud POS provider Lightspeed reports security incident

    Cloud POS provider Lightspeed reports a 'security incident,' reminds customers to change passwords and developers to implement OAuth 2.0 for improved authentication.

  • September 08, 2016 08 Sep'16

    Dropbox breach may be fueling phishing campaigns

    Phishing campaigns appear to be gearing up as email addresses and hashed passwords for more than 68 million Dropbox accounts circulate on dark web sites.

  • September 01, 2016 01 Sep'16

    Dropbox passwords breach exposed 68 million users

    Confirming that 68 million Dropbox passwords were exposed in 2012, the cloud provider continued to urge users to update their credentials and enable two-factor authentication.

  • August 31, 2016 31 Aug'16

    Ping: Distributed ledgers are the future of identity security

    SearchCloudSecurity's interview with Ping Identity CEO Andre Durand explores how distributed ledgers can be used for identity and access management.

  • August 30, 2016 30 Aug'16

    Ping: It's time to address obstacles for identity as a service

    Ping Identity CEO Andre Durand talks with SearchCloudSecurity about the benefits of identity as a service as well as the issues holding back greater enterprise adoption of IDaaS.