Cloud Computing Security Issues Incident Response Data Breach Prevention
- September 08, 2016
Phishing campaigns appear to be gearing up as email addresses and hashed passwords for more than 68 million Dropbox accounts circulate on dark web sites.
- September 01, 2016
Confirming that 68 million Dropbox passwords were exposed in 2012, the cloud provider continued to urge users to update their credentials and enable two-factor authentication.
- February 10, 2016
Now that enterprise data is stored in clouds of all shapes and sizes, IT needs to provide more security options than ever. This ezine supplement focuses on the issue of cloud safety and zones in on three of the latest cloud developments and their ...
- July 09, 2015
Researchers at Elastica recently discovered an Indian government agency had its employees' email addresses and passwords exposed through Google Drive.
- June 19, 2015
A new report from Netskope finds copious DLP violations in enterprises' cloud apps due to insufficient cloud storage security.
- June 08, 2015
A new study from cloud access security broker Elastica shows a growing amount of shadow data is leaking out of enterprises via cloud services.
- June 02, 2015
Symantec looks to strengthen cloud security presence by launching Data Loss Prevention 14 and teaming up with Box.
- October 31, 2014
A new study by cloud security startup Elastica shows that enterprise employees are unknowingly leaking sensitive data through cloud apps and services.
- August 12, 2014
IBM made its second cloud security acquisition in as many weeks with the purchase of Lighthouse Security Group, which specializes in cloud-based IAM services.
- July 31, 2014
Netskope's Cloud Report shows the average number of cloud apps used in the enterprise is growing -- but the majority of those apps lack proper security and policy controls.
- December 05, 2013
A practitioner at the 2013 CSA Congress says enterprises must plan for a cloud incident because providers often fail to detail their responsibilities.
- November 07, 2012
Bring-your-own-device (BYOD) makes securing cloud services complex, say experts. Enterprises should set mobile guidelines consistent with cloud policies.
- November 07, 2012
Security pros need to share anonymous attack information or face dire consequences, said Dave Cullinane, CEO of Security Starfish and chairman of the Cloud Security Alliance.
- October 03, 2012
U.S. Mint CISO Chris Carpenter said his cloud provider wasn't ready for either his security questions or to share continuous monitoring and log data.
- June 05, 2012
A sophisticated attack on the website security firm involved Google Apps, AT&T security problems.