News

News

  • September 29, 2014 29 Sep'14

    Cloud security experts call for global data privacy standards

    A recent study from the Cloud Security Alliance shows strong support for global data privacy standards as well as a consumer bill of rights, but there are major obstacles for privacy in the cloud.

  • September 25, 2014 25 Sep'14

    Shining a light on shadow cloud apps and services

    Security pros from Hewlett-Packard and SkyHigh Networks offer insight on how to identify shadow cloud apps and services within the enterprise.

  • September 23, 2014 23 Sep'14

    Experts: Expect cloud breaches to endanger data privacy

    Attendees and speakers at the CSA Congress and IAPP Privacy Academy stressed the need for better data classification to reduce the effects of cloud breaches.

  • September 19, 2014 19 Sep'14

    Pandora balancing cloud app security and shadow IT

    Internet radio company Pandora explains how it found a strategy to embrace shadow IT and still secure cloud app usage within the company.

  • September 12, 2014 12 Sep'14

    Cloud computing threat intelligence platforms: The next big thing?

    Following FireEye's new threat analytics platform for Amazon Web Services, are enterprises ready to embrace the benefits of cloud-based threat analytics?

  • Sponsored News

    • A New/Old Weapon Against Ransomware: Tape Backup

      In just a few short years, ransomware has emerged as one of cybersecurity’s most dominant, persistent and treacherous threats. In 2016, ransomware payments reached more than $1 billion, according to the FBI, up from just $24 million paid in 2015. The spike in payments is increasing the velocity and variety of attacks exponentially: In 2017 ransomware on the dark market has grown by 2,500%. See More

    • 6 Technology Trends That Are Driving Business Transformation

      Global organizations are expected to spend $1.2 trillion on digital transformation technologies in 2017, according to IDC. And going forward, this investment will grow to the tune of 18% a year, reaching $2 trillion in 2020. See More

    • The Digitally Transformed Enterprise

      Though the jury is still out over what constitutes successful digital transformation, there is no question about the immense excitement in this area as organizations seek to re-architect their IT environments to be more agile and responsive to modern business needs. See More

    • How IT Leaders Are Leveraging Hyper-convergence to Lower TCO

      Reduced costs is the No. 1 reason IT leaders are turning to hyper-converged infrastructure (HCI) as they strive to modernize their data centers, according to TechTarget Research. In a survey, nearly 50% of current users cited reduced cost as their top priority in deploying HCI, as did nearly 40% of prospective customers (see chart at bottom). See More

    View All Sponsored News
  • September 02, 2014 02 Sep'14

    Following iCloud hack, experts say enterprise data likely at risk

    Following the iCloud hack and resulting leak of celebrity photos, experts say many enterprises 'don't have a clue' that corporate data could also be at risk.

  • September 02, 2014 02 Sep'14

    Helix Nebula cloud security hinges on federated identity management

    CERN and the Cloud Security Alliance explain how federated identity management protects Helix Nebula, a European cloud platform that's running applications for such research projects as the Large Hadron Collider.

  • August 15, 2014 15 Aug'14

    Amazon Workspaces gets MFA security update

    Amazon Web Services has added multifactor authentication to its WorkSpaces cloud desktop service, the first step in a larger effort to bolster AWS security.

  • August 13, 2014 13 Aug'14

    Amazon Workspaces gets MFA security update

    Amazon Web Services has added multifactor authentication to its WorkSpaces cloud desktop service, the first step in a larger effort to bolster AWS security.

  • August 12, 2014 12 Aug'14

    IBM ups cloud IAM offering with Lighthouse acquisition

    IBM made its second cloud security acquisition in as many weeks with the purchase of Lighthouse Security Group, which specializes in cloud-based IAM services.

  • August 07, 2014 07 Aug'14

    Black Hat 2014: Researcher reveals Amazon cloud security weaknesses

    At Black Hat 2014, a researcher showed how AWS cloud security flaws and misconfigurations can have devastating consequences for AWS customers that don't take security seriously.

  • August 06, 2014 06 Aug'14

    Black Hat 2014: Researcher reveals Amazon cloud security weaknesses

    At Black Hat 2014, a researcher showed how AWS cloud security flaws and misconfigurations can have devastating consequences for AWS customers that don't take security seriously.

  • July 31, 2014 31 Jul'14

    Study: Cloud app data sharing growth increases risks

    Netskope's Cloud Report shows the average number of cloud apps used in the enterprise is growing -- but the majority of those apps lack proper security and policy controls.

  • July 18, 2014 18 Jul'14

    CSA releases new Cloud Controls Matrix and CAIQ standards

    The Cloud Security Alliance has updated its Cloud Controls Matrix (CCM) and Consensus Assessments Questionnaire (CAIQ) to help enterprises standardize cloud provider security assessments.

  • July 15, 2014 15 Jul'14

    Verizon unveils cloud-based WAF

    Verizon bolstered its cloud security presence with a new web application firewall. The cloud-based WAF puts the telecom giant in the growing cloud firewall market with Akamai, Imperva and others.

-ADS BY GOOGLE

SearchSecurity

SearchCloudComputing

SearchAWS

SearchCloudApplications

SearchServerVirtualization

SearchVMware

ComputerWeekly.com

Close