- December 17, 2009
New version provides more actionable advice for ensuring cloud computing security
- November 10, 2009
Shared Assessments program unveils updated tools for assessing security of service providers, including cloud providers
- November 05, 2009
EMC's Eric Baize says companies should consider security early and establish trust with the cloud provider. But many factors hinge on an enterprise's specific security strategy.
- September 24, 2009
The PCI Virtualization Special Interest Group is trying to find consensus before proposing ways to add the technology to the Payment Card Industry Data Security Standards (PCI DSS).
- September 21, 2009
Panel discusses cloud computing security issues including encryption and user authentication.
Sponsored by Iron Mountain - In just a few short years, ransomware has emerged as one of cybersecurity’s most dominant, persistent and treacherous threats. In 2016, ransomware payments reached more than $1 billion, according to the FBI, up from just $24 million paid in 2015. The spike in payments is increasing the velocity and variety of attacks exponentially: In 2017 ransomware on the dark market has grown by 2,500%. See More
Sponsored by Rackspace - Global organizations are expected to spend $1.2 trillion on digital transformation technologies in 2017, according to IDC. And going forward, this investment will grow to the tune of 18% a year, reaching $2 trillion in 2020. See More
Sponsored by NTT - Though the jury is still out over what constitutes successful digital transformation, there is no question about the immense excitement in this area as organizations seek to re-architect their IT environments to be more agile and responsive to modern business needs. See More
Sponsored by Dell EMC - Reduced costs is the No. 1 reason IT leaders are turning to hyper-converged infrastructure (HCI) as they strive to modernize their data centers, according to TechTarget Research. In a survey, nearly 50% of current users cited reduced cost as their top priority in deploying HCI, as did nearly 40% of prospective customers (see chart at bottom). See More
- June 10, 2009
The challenge for security teams is to safely integrate extended cloud capabilities into corporate policies and procedures.
- May 14, 2009
While it could save money, many firms should understand the security, privacy and legal issues when using cloud-based services.
- April 29, 2009
Trend Micro said Third Brigade's technology bolsters its datacenter security strategy by helping its customers protect virtual servers and cloud computing initiatives.
- April 23, 2009
Experts and vendors make the case for the security attributes of thin and robust hypervisors, but rapid changes in virtualization technology could further complicate the virtualization security debate.
- April 22, 2009
The non-profit Cloud Security Alliance says its comprehensive report serves as the starting point for a broader discussion on cloud computing security issues.
- April 21, 2009
With the release, the virtualization powerhouse will now enable third-party security vendors to apply security within the hypervisor to safeguard virtual machines at the host level.
- April 21, 2009
Troy Leach, technical director for the Payment Card Industry Security Standards Council recognizes a gap in the standard when it comes to addressing the security of payment card data in cloud computing and virtualized environments. In an interview,...
- April 17, 2009
Cloud computing is changing the way we do business; the scalability, flexibility and cost savings are seductive, even irresistible. But, as with every "next big thing" in technology, security is a potential stumbling point. The distributed computing...
- April 15, 2009
The Cloud Security Alliance will need to sharpen its focus if it expects to contribute useful information and foster a discussion around security in the cloud.
- September 15, 2008
Total Protection for Virtualization is a suite of products that includes a component that scans offline virtual images for configuration and security vulnerabilities.