News

News

  • March 02, 2016 02 Mar'16

    Redundant cloud security controls creating headaches

    Trend Micro's Mark Nunnikhoven said enterprises are often forced to deploy distinct cloud security controls for each type of service they deploy, making security unmanageable.

  • March 01, 2016 01 Mar'16

    Cloud providers weigh in on iPhone backdoor debate

    During a panel discussion at RSA Conference 2016, representatives from top cloud providers such as Google and Microsoft discussed the legal battle between Apple and the FBI over encrypted data.

  • February 29, 2016 29 Feb'16

    Cloud malware leads to high-speed impact

    During the CSA Summit at At RSA’s 2016 Conference, Netskope warned how cloud synchronization services can spread malware infection throughout an enterprise.

  • February 10, 2016 10 Feb'16

    Insider edition: How to contain a cloud, and other cloud safety concerns

    Now that enterprise data is stored in clouds of all shapes and sizes, IT needs to provide more security options than ever. This ezine supplement focuses on the issue of cloud safety and zones in on three of the latest cloud developments and their ...

  • February 03, 2016 03 Feb'16

    Privacy Shield to replace Safe Harbor framework

    The EU and U.S. agree on Privacy Shield as the replacement for the Safe Harbor framework for transatlantic data flows, though questions remain over privacy protection details.

  • Sponsored News

    • The CIO’s IT Transformation Survival Guide

      It’s a challenging time to be a CIO in an enterprise IT environment. I’ve seen the role evolve dramatically over the years, from chief of back-office IT to dynamic business enabler. The “I” in “CIO” could now stand for “innovation” instead of “information.” See More

    • When It Comes to Cloud Security, What You Don’t Know Can Hurt You

      One of the most important challenges for CIOs and CISOs is to gain visibility into their cloud security stance. If they can’t identify where security or compliance gaps exist, how can they be expected to put the proper controls and protections into place? See More

    • The IT Transformation Questions Every CIO Should Ask

      According to Deloitte’s 2016-2017 global CIO survey, the top expectations that the business has of CIOs are improving processes, reducing costs and driving efficiencies. This is consistent with a 2016 report from Technology Business Research, which found that efficiency metrics are the primary drivers behind the adoption of cloud professional services. See More

    • Why You Need an Automated Approach to Cloud Security and Compliance

      Whether you are responsible for overall IT, IT security, DevOps or regulatory compliance, chances are public cloud services are an ever-growing part of your portfolio. This can be great for the business, enabling lower costs, greater agility and faster speed to market. But it can present new and difficult challenges in ensuring security and compliance. See More

    View All Sponsored News
  • February 01, 2016 01 Feb'16

    Readers' top picks for cloud security products

    What companies and cloud security products do organizations consider when they see to reduce their cloud vulnerabilities?

  • January 28, 2016 28 Jan'16

    Industry group says FedRAMP certification process is 'broken'

    An advocacy group representing cloud providers such as Hewlett Packard Enterprise and IBM has criticized FedRAMP and called on the government to fix the cloud certification program.

  • January 22, 2016 22 Jan'16

    LostPass security researcher questions LastPass responses

    The security researcher behind the LostPass phishing attack on LastPass has criticized the company's reaction and responses to his findings.

  • January 19, 2016 19 Jan'16

    'LostPass' phishing attack targets LastPass credentials

    A new proof-of-concept attack presented at ShmooCon 2016 exploits security weaknesses in cloud-based password manager LastPass and could allow attackers to gain control of users' accounts.

  • January 13, 2016 13 Jan'16

    RSA president outlines cloud security strategy, IDaaS plans

    RSA President Amit Yoran discusses how the security vendor is changing its focus and explains how cloud security will play an important role in RSA's new strategy.

  • December 16, 2015 16 Dec'15

    Spy Banker Trojan takes advantage of Google cloud servers

    Security researchers at Zscaler discovered a new Spy Banker Trojan campaign that's leveraging Google's public cloud services as a hosting platform.

  • December 10, 2015 10 Dec'15

    Pulse Secure readying Cloud Secure offering

    Following its split from Juniper Networks, Pulse Secure looks to take on cloud access and authentication problems with a new product.

  • December 03, 2015 03 Dec'15

    Chinese APT group abused Dropbox to spread LOWBALL malware

    FireEye researchers discovered an advanced persistent threat group that used Dropbox to launch a spear phishing campaign against Hong Kong media companies.

  • November 24, 2015 24 Nov'15

    Blue Coat merges CASBs with Web gateway security

    After acquiring two cloud access security brokers this year, Blue Coat Systems has united CASB capabilities with its Web gateway security technology under a new cloud security strategy.

  • November 10, 2015 10 Nov'15

    Blue Coat acquires Elastica in $280 million CASB deal

    After acquiring Perspecsys this summer, Blue Coat Systems makes another CASB deal for Elastica to further strengthen its cloud security presence.

-ADS BY GOOGLE

SearchSecurity

SearchCloudComputing

SearchAWS

SearchCloudApplications

SearchServerVirtualization

SearchVMware

ComputerWeekly

Close