- January 26, 2015
Rackspace hopes its new emphasis on security-centric managed cloud services will be enough to overcome past security and availability problems, as well as differentiate itself from public cloud rivals AWS and Microsoft.
- January 16, 2015
Cloud collaboration firm Ribose became the first company to achieve the Cloud Security Alliance's STAR Attestation process.
- January 09, 2015
Cloud Security Alliance findings show many enterprises struggle to identify and control shadow cloud apps and services; half of those surveyed told the CSA they have no program in place manage cloud apps and services.
- January 05, 2015
A hacking tool released on New Year's Day highlighted a security hole in Apple's public cloud service that left user accounts vulnerable.
- December 30, 2014
The Cloud Security Alliance says cloud data privacy has emerged as a top issue for industry amid Microsoft's battle with the U.S. government over customer emails stored in Ireland.
Sponsored by DellEMC - Is yours one of those organisations that has been on the sidelines for Windows 10 or has migrated only a portion of its user base? If so, your users and IT teams are missing out on a wide range of benefits — including improved security, greater performance, simplified operations and maintenance, and enhanced support for cloud environments. See More
Sponsored by Rackspace - Businesses must deliver a consistent high-value experience—or risk losing customers to someone who can. And they’re turning to big data technologies to help. With big data analytics, organizations can get to know their customers better, learn their habits and anticipate their needs to deliver a better customer experience. See More
Sponsored by Dell EMC - In today’s business environment, software has become a critical differentiator in determining business success. A recent article in Harvard Business Review postulates that every business is a competitor on a software playing field, no matter what sector it is in. See More
Sponsored by DellEMC - Security threats are becoming more advanced, targeted and sophisticated. Unfortunately, we see the results in the news regularly, with recent attacks such as WannaCry and Petya crippling organisations worldwide. Endpoints remain by far the No. 1 source of security breaches — for certain types of breaches, 95% occur at the endpoint. See More
- December 16, 2014
Microsoft's refusal to give the U.S. government customer emails stored in Ireland will likely have implications for enterprise cloud data privacy and security.
- December 04, 2014
Microsoft is working to improve Azure security, but analysts say Amazon Web Services is still in the lead when it comes to cloud security capabilities.
- November 19, 2014
Newly announced Amazon Web Services security features include an encryption key management service intended to boost cloud security and strengthen appeal of AWS to enterprises.
- November 05, 2014
With IBM Dynamic Cloud Security, Big Blue is shifting its entire security portfolio, from managed services to threat analytics, to the cloud.
- October 31, 2014
A new study by cloud security startup Elastica shows that enterprise employees are unknowingly leaking sensitive data through cloud apps and services.
- October 20, 2014
There is more potential trouble for Apple iCloud users as a nationwide man-in-the-middle attack struck the iCloud website in China amid the country's launch of the new iPhone 6.
- October 09, 2014
After a Xen hypervisor flaw led several major cloud providers to reboot their host servers, experts say future cloud computing hypervisor security issues will likely cause further service disruptions.
- October 07, 2014
Sophos looks to strengthen its cloud security offerings for mobile security with the acquisition of Mojave Networks, a mobile security startup.
- September 29, 2014
A recent study from the Cloud Security Alliance shows strong support for global data privacy standards as well as a consumer bill of rights, but there are major obstacles for privacy in the cloud.
- September 25, 2014
Security pros from Hewlett-Packard and SkyHigh Networks offer insight on how to identify shadow cloud apps and services within the enterprise.