- September 19, 2012
Company uses virtualization technology to isolate malware from the rest of the system.
- September 05, 2012
Group will develop standards for communicating cloud data privacy measures.
- August 31, 2012
CSA will work with Fujitsu Laboratories of America on best practices, standards for securing big data.
- August 28, 2012
The vCloud Networking and Security package, featuring vShield Edge and vShield App, is designed to make virtualization security easier to implement.
- August 27, 2012
At VMworld 2012, security suppliers plan to showcase new antimalware protection, policy enforcement products to secure VMware environments.
Sponsored by DellEMC - Is yours one of those organisations that has been on the sidelines for Windows 10 or has migrated only a portion of its user base? If so, your users and IT teams are missing out on a wide range of benefits — including improved security, greater performance, simplified operations and maintenance, and enhanced support for cloud environments. See More
Sponsored by Rackspace - Businesses must deliver a consistent high-value experience—or risk losing customers to someone who can. And they’re turning to big data technologies to help. With big data analytics, organizations can get to know their customers better, learn their habits and anticipate their needs to deliver a better customer experience. See More
Sponsored by Dell EMC - In today’s business environment, software has become a critical differentiator in determining business success. A recent article in Harvard Business Review postulates that every business is a competitor on a software playing field, no matter what sector it is in. See More
Sponsored by DellEMC - Security threats are becoming more advanced, targeted and sophisticated. Unfortunately, we see the results in the news regularly, with recent attacks such as WannaCry and Petya crippling organisations worldwide. Endpoints remain by far the No. 1 source of security breaches — for certain types of breaches, 95% occur at the endpoint. See More
- August 22, 2012
The AV giant says the Windows version of the Crisis Trojan may be the first malware that can spread to so many different platforms.
- August 21, 2012
The British Standards Institution will help the CSA develop a certification program for cloud providers.
- August 14, 2012
Trend Micro adds to its cloud-based security technology, but one expert says the additions haven't put it ahead of the competition.
- August 08, 2012
Global study shows that some organizations are moving sensitive data to the cloud at the expense of security.
- July 24, 2012
Amazon Web Services has filed details on its security controls with Cloud Security Alliance online registry, showing a new level of transparency.
- July 17, 2012
Deal boosts networking giant's cloud security technology.
- July 10, 2012
Maintaining PCI DSS compliance in the cloud is possible, but merchants often have the difficult job of maintaining transparency and getting log data from their cloud payment provider.
- June 19, 2012
Cloud computing can help improve SMB security operations but doesn’t bode well for software security.
- June 14, 2012
Okta service streamlines unmanageable number of accounts and passwords for Genomic Health.
- June 11, 2012
The GSA says cloud providers are lining up for FedRAMP certification, and its continuous cloud monitoring guidelines are a few weeks away.