- July 28, 2011
The CTO of NASA’s famous JPL told a Gartner Catalyst 2011 crowd how his group conducts sensitive scientific work using a hybrid cloud security model.
- July 25, 2011
Guide explains how organizations can leverage COBIT to manage their cloud computing environments.
- July 15, 2011
Opinion: CSA Executive Director Jim Reavis assesses the challenges associated with certifying the security capabilities of cloud providers.
- July 14, 2011
Free tool gives organizations a standard way to obtain security and compliance information from a cloud provider.
- July 12, 2011
New sensitive data discovery features in the virtualization giant’s updated platform will allow enterprises to discover and classify data inside VMs.
Sponsored by DellEMC - Is yours one of those organisations that has been on the sidelines for Windows 10 or has migrated only a portion of its user base? If so, your users and IT teams are missing out on a wide range of benefits — including improved security, greater performance, simplified operations and maintenance, and enhanced support for cloud environments. See More
Sponsored by Rackspace - Businesses must deliver a consistent high-value experience—or risk losing customers to someone who can. And they’re turning to big data technologies to help. With big data analytics, organizations can get to know their customers better, learn their habits and anticipate their needs to deliver a better customer experience. See More
Sponsored by Dell EMC - In today’s business environment, software has become a critical differentiator in determining business success. A recent article in Harvard Business Review postulates that every business is a competitor on a software playing field, no matter what sector it is in. See More
Sponsored by DellEMC - Security threats are becoming more advanced, targeted and sophisticated. Unfortunately, we see the results in the news regularly, with recent attacks such as WannaCry and Petya crippling organisations worldwide. Endpoints remain by far the No. 1 source of security breaches — for certain types of breaches, 95% occur at the endpoint. See More
- June 28, 2011
Cloud giant makes it clear the onus is on customers when it comes to HIPAA, GLBA and other regulations.
- June 27, 2011
Gartner analysts say infosec teams can avoid tomorrow’s cloud computing security problems by anticipating future usage and becoming facilitators.
- June 23, 2011
Study shows that many AWS users are disregarding security and creating cloud vulnerabilities.
- June 21, 2011
Security teams need to be involved in the contract process to ensure data security provisions are included.
- June 15, 2011
Compliance with the PCI security standard tricky in public cloud environments, report says.
- June 10, 2011
AWS customers can use the on-demand service to test the security of their cloud deployments.
- June 02, 2011
Security consultant offers up list of missteps companies should avoid in cloud security.
- May 27, 2011
CDW study finds that cloud users aren’t implementing security capabilities or verifying cloud provider security.
- May 24, 2011
Security companies look to overcome performance bottlenecks with retooled technology for virtual security.
- May 16, 2011
CSA Executive Director Jim Reavis reflects on the recent cloud provider outages.