News

News

  • February 29, 2016 29 Feb'16

    Cloud malware leads to high-speed impact

    During the CSA Summit at At RSA’s 2016 Conference, Netskope warned how cloud synchronization services can spread malware infection throughout an enterprise.

  • February 10, 2016 10 Feb'16

    Insider edition: How to contain a cloud, and other cloud safety concerns

    Now that enterprise data is stored in clouds of all shapes and sizes, IT needs to provide more security options than ever. This ezine supplement focuses on the issue of cloud safety and zones in on three of the latest cloud developments and their ...

  • February 03, 2016 03 Feb'16

    Privacy Shield to replace Safe Harbor framework

    The EU and U.S. agree on Privacy Shield as the replacement for the Safe Harbor framework for transatlantic data flows, though questions remain over privacy protection details.

  • February 01, 2016 01 Feb'16

    Readers' top picks for cloud security products

    What companies and cloud security products do organizations consider when they see to reduce their cloud vulnerabilities?

  • January 28, 2016 28 Jan'16

    Industry group says FedRAMP certification process is 'broken'

    An advocacy group representing cloud providers such as Hewlett Packard Enterprise and IBM has criticized FedRAMP and called on the government to fix the cloud certification program.

  • Sponsored News

    • Dell/EMCの合併がコンバージドシステム市場に与える影響

      DellとEMCの合併が正式に完了した今、この合併は、コンバージドシステムの市場にどのような影響を与えるのでしょうか?コンバージェンス(統合)への需要は、合併前から着実に増大していました。IDCの予測によると、コンバージドシステムに対する支出総額は、2014年の82億ドルから2018年には175億ドルへと、年平均成長率21%ほどの拡大が見込まれています。 See More

    • When It Comes to Cloud Security, What You Don’t Know Can Hurt You

      One of the most important challenges for CIOs and CISOs is to gain visibility into their cloud security stance. If they can’t identify where security or compliance gaps exist, how can they be expected to put the proper controls and protections into place? See More

    • コンバージドシステムの新たな経済性を活用

      デジタル変革、そしてクラウドコンピューティング、モビリティ、ビッグデータアナリティクスなどの第三のプラットフォーム技術。これらの採用を推進するにあたり、ビジネス部門およびIT部門のリーダーは、ITインフラの導入や管理により組織のニーズにどう対処していくかをめぐって、新たな現実に直面することになります。データセンターはもはや、単なるバックオフィス業務を支えるものではなく、ビジネスの中枢であり、イノベーション、俊敏性、コストパフォーマンスを押し上げる重要な差別化要因といえます。 See More

    • Why You Need an Automated Approach to Cloud Security and Compliance

      Whether you are responsible for overall IT, IT security, DevOps or regulatory compliance, chances are public cloud services are an ever-growing part of your portfolio. This can be great for the business, enabling lower costs, greater agility and faster speed to market. But it can present new and difficult challenges in ensuring security and compliance. See More

    View All Sponsored News
  • January 22, 2016 22 Jan'16

    LostPass security researcher questions LastPass responses

    The security researcher behind the LostPass phishing attack on LastPass has criticized the company's reaction and responses to his findings.

  • January 19, 2016 19 Jan'16

    'LostPass' phishing attack targets LastPass credentials

    A new proof-of-concept attack presented at ShmooCon 2016 exploits security weaknesses in cloud-based password manager LastPass and could allow attackers to gain control of users' accounts.

  • January 13, 2016 13 Jan'16

    RSA president outlines cloud security strategy, IDaaS plans

    RSA President Amit Yoran discusses how the security vendor is changing its focus and explains how cloud security will play an important role in RSA's new strategy.

  • December 16, 2015 16 Dec'15

    Spy Banker Trojan takes advantage of Google cloud servers

    Security researchers at Zscaler discovered a new Spy Banker Trojan campaign that's leveraging Google's public cloud services as a hosting platform.

  • December 10, 2015 10 Dec'15

    Pulse Secure readying Cloud Secure offering

    Following its split from Juniper Networks, Pulse Secure looks to take on cloud access and authentication problems with a new product.

  • December 03, 2015 03 Dec'15

    Chinese APT group abused Dropbox to spread LOWBALL malware

    FireEye researchers discovered an advanced persistent threat group that used Dropbox to launch a spear phishing campaign against Hong Kong media companies.

  • November 24, 2015 24 Nov'15

    Blue Coat merges CASBs with Web gateway security

    After acquiring two cloud access security brokers this year, Blue Coat Systems has united CASB capabilities with its Web gateway security technology under a new cloud security strategy.

  • November 10, 2015 10 Nov'15

    Blue Coat acquires Elastica in $280 million CASB deal

    After acquiring Perspecsys this summer, Blue Coat Systems makes another CASB deal for Elastica to further strengthen its cloud security presence.

  • November 06, 2015 06 Nov'15

    Dropbox Enterprise launches with new security features

    Dropbox stepped up its security offerings this week with the introduction of Dropbox Enterprise and several new cloud security controls for business customers.

  • October 30, 2015 30 Oct'15

    Xen hypervisor security flaw patched after seven years

    A critical Xen hypervisor security flaw that allows attackers to access host operating systems and had gone undiscovered for several years was finally patched this week.

-ADS BY GOOGLE

SearchSecurity

SearchCloudComputing

SearchAWS

SearchCloudApplications

SearchServerVirtualization

SearchVMware

ComputerWeekly

Close