News

News

  • September 29, 2014 29 Sep'14

    Cloud security experts call for global data privacy standards

    A recent study from the Cloud Security Alliance shows strong support for global data privacy standards as well as a consumer bill of rights, but there are major obstacles for privacy in the cloud.

  • September 25, 2014 25 Sep'14

    Shining a light on shadow cloud apps and services

    Security pros from Hewlett-Packard and SkyHigh Networks offer insight on how to identify shadow cloud apps and services within the enterprise.

  • September 23, 2014 23 Sep'14

    Experts: Expect cloud breaches to endanger data privacy

    Attendees and speakers at the CSA Congress and IAPP Privacy Academy stressed the need for better data classification to reduce the effects of cloud breaches.

  • September 19, 2014 19 Sep'14

    Pandora balancing cloud app security and shadow IT

    Internet radio company Pandora explains how it found a strategy to embrace shadow IT and still secure cloud app usage within the company.

  • September 12, 2014 12 Sep'14

    Cloud computing threat intelligence platforms: The next big thing?

    Following FireEye's new threat analytics platform for Amazon Web Services, are enterprises ready to embrace the benefits of cloud-based threat analytics?

  • Sponsored News

    • Dell/EMCの合併がコンバージドシステム市場に与える影響

      DellとEMCの合併が正式に完了した今、この合併は、コンバージドシステムの市場にどのような影響を与えるのでしょうか?コンバージェンス(統合)への需要は、合併前から着実に増大していました。IDCの予測によると、コンバージドシステムに対する支出総額は、2014年の82億ドルから2018年には175億ドルへと、年平均成長率21%ほどの拡大が見込まれています。 See More

    • When It Comes to Cloud Security, What You Don’t Know Can Hurt You

      One of the most important challenges for CIOs and CISOs is to gain visibility into their cloud security stance. If they can’t identify where security or compliance gaps exist, how can they be expected to put the proper controls and protections into place? See More

    • コンバージドシステムの新たな経済性を活用

      デジタル変革、そしてクラウドコンピューティング、モビリティ、ビッグデータアナリティクスなどの第三のプラットフォーム技術。これらの採用を推進するにあたり、ビジネス部門およびIT部門のリーダーは、ITインフラの導入や管理により組織のニーズにどう対処していくかをめぐって、新たな現実に直面することになります。データセンターはもはや、単なるバックオフィス業務を支えるものではなく、ビジネスの中枢であり、イノベーション、俊敏性、コストパフォーマンスを押し上げる重要な差別化要因といえます。 See More

    • Why You Need an Automated Approach to Cloud Security and Compliance

      Whether you are responsible for overall IT, IT security, DevOps or regulatory compliance, chances are public cloud services are an ever-growing part of your portfolio. This can be great for the business, enabling lower costs, greater agility and faster speed to market. But it can present new and difficult challenges in ensuring security and compliance. See More

    View All Sponsored News
  • September 02, 2014 02 Sep'14

    Following iCloud hack, experts say enterprise data likely at risk

    Following the iCloud hack and resulting leak of celebrity photos, experts say many enterprises 'don't have a clue' that corporate data could also be at risk.

  • September 02, 2014 02 Sep'14

    Helix Nebula cloud security hinges on federated identity management

    CERN and the Cloud Security Alliance explain how federated identity management protects Helix Nebula, a European cloud platform that's running applications for such research projects as the Large Hadron Collider.

  • August 15, 2014 15 Aug'14

    Amazon Workspaces gets MFA security update

    Amazon Web Services has added multifactor authentication to its WorkSpaces cloud desktop service, the first step in a larger effort to bolster AWS security.

  • August 13, 2014 13 Aug'14

    Amazon Workspaces gets MFA security update

    Amazon Web Services has added multifactor authentication to its WorkSpaces cloud desktop service, the first step in a larger effort to bolster AWS security.

  • August 12, 2014 12 Aug'14

    IBM ups cloud IAM offering with Lighthouse acquisition

    IBM made its second cloud security acquisition in as many weeks with the purchase of Lighthouse Security Group, which specializes in cloud-based IAM services.

  • August 07, 2014 07 Aug'14

    Black Hat 2014: Researcher reveals Amazon cloud security weaknesses

    At Black Hat 2014, a researcher showed how AWS cloud security flaws and misconfigurations can have devastating consequences for AWS customers that don't take security seriously.

  • August 06, 2014 06 Aug'14

    Black Hat 2014: Researcher reveals Amazon cloud security weaknesses

    At Black Hat 2014, a researcher showed how AWS cloud security flaws and misconfigurations can have devastating consequences for AWS customers that don't take security seriously.

  • July 31, 2014 31 Jul'14

    Study: Cloud app data sharing growth increases risks

    Netskope's Cloud Report shows the average number of cloud apps used in the enterprise is growing -- but the majority of those apps lack proper security and policy controls.

  • July 18, 2014 18 Jul'14

    CSA releases new Cloud Controls Matrix and CAIQ standards

    The Cloud Security Alliance has updated its Cloud Controls Matrix (CCM) and Consensus Assessments Questionnaire (CAIQ) to help enterprises standardize cloud provider security assessments.

  • July 15, 2014 15 Jul'14

    Verizon unveils cloud-based WAF

    Verizon bolstered its cloud security presence with a new web application firewall. The cloud-based WAF puts the telecom giant in the growing cloud firewall market with Akamai, Imperva and others.

-ADS BY GOOGLE

SearchSecurity

SearchCloudComputing

SearchAWS

SearchCloudApplications

SearchServerVirtualization

SearchVMware

ComputerWeekly

Close