- December 17, 2009
New version provides more actionable advice for ensuring cloud computing security
- November 10, 2009
Shared Assessments program unveils updated tools for assessing security of service providers, including cloud providers
- November 05, 2009
EMC's Eric Baize says companies should consider security early and establish trust with the cloud provider. But many factors hinge on an enterprise's specific security strategy.
- September 24, 2009
The PCI Virtualization Special Interest Group is trying to find consensus before proposing ways to add the technology to the Payment Card Industry Data Security Standards (PCI DSS).
- September 21, 2009
Panel discusses cloud computing security issues including encryption and user authentication.
Sponsored by Rackspace - It’s a challenging time to be a CIO in an enterprise IT environment. I’ve seen the role evolve dramatically over the years, from chief of back-office IT to dynamic business enabler. The “I” in “CIO” could now stand for “innovation” instead of “information.” See More
Sponsored by evident.io - One of the most important challenges for CIOs and CISOs is to gain visibility into their cloud security stance. If they can’t identify where security or compliance gaps exist, how can they be expected to put the proper controls and protections into place? See More
Sponsored by Rackspace - According to Deloitte’s 2016-2017 global CIO survey, the top expectations that the business has of CIOs are improving processes, reducing costs and driving efficiencies. This is consistent with a 2016 report from Technology Business Research, which found that efficiency metrics are the primary drivers behind the adoption of cloud professional services. See More
Sponsored by evident.io - Whether you are responsible for overall IT, IT security, DevOps or regulatory compliance, chances are public cloud services are an ever-growing part of your portfolio. This can be great for the business, enabling lower costs, greater agility and faster speed to market. But it can present new and difficult challenges in ensuring security and compliance. See More
- June 10, 2009
The challenge for security teams is to safely integrate extended cloud capabilities into corporate policies and procedures.
- May 14, 2009
While it could save money, many firms should understand the security, privacy and legal issues when using cloud-based services.
- April 29, 2009
Trend Micro said Third Brigade's technology bolsters its datacenter security strategy by helping its customers protect virtual servers and cloud computing initiatives.
- April 23, 2009
Experts and vendors make the case for the security attributes of thin and robust hypervisors, but rapid changes in virtualization technology could further complicate the virtualization security debate.
- April 22, 2009
The non-profit Cloud Security Alliance says its comprehensive report serves as the starting point for a broader discussion on cloud computing security issues.
- April 21, 2009
With the release, the virtualization powerhouse will now enable third-party security vendors to apply security within the hypervisor to safeguard virtual machines at the host level.
- April 21, 2009
Troy Leach, technical director for the Payment Card Industry Security Standards Council recognizes a gap in the standard when it comes to addressing the security of payment card data in cloud computing and virtualized environments. In an interview,...
- April 17, 2009
Cloud computing is changing the way we do business; the scalability, flexibility and cost savings are seductive, even irresistible. But, as with every "next big thing" in technology, security is a potential stumbling point. The distributed computing...
- April 15, 2009
The Cloud Security Alliance will need to sharpen its focus if it expects to contribute useful information and foster a discussion around security in the cloud.
- September 15, 2008
Total Protection for Virtualization is a suite of products that includes a component that scans offline virtual images for configuration and security vulnerabilities.