- July 15, 2014
Exclusive: The co-founder of One More Cloud explains how an old AWS API key was used to take down the company's services, and the hard lessons learned.
- July 14, 2014
Cloud-based malware analysis is becoming a must-have feature for both established and upstart advanced threat protection vendors.
- May 30, 2014
Security pros say infosec teams must be proactive on cloud security management to reduce risk related to rapid growth in enterprise cloud computing.
- May 29, 2014
The consequences for cloud service providers missing the FedRAMP deadline remain unclear, though experts say those in the queue are in good shape.
- May 07, 2014
A Netskope report shows a flood of cloud security policy exceptions commonly thwart rogue cloud app security controls.
Sponsored by Iron Mountain - In just a few short years, ransomware has emerged as one of cybersecurity’s most dominant, persistent and treacherous threats. In 2016, ransomware payments reached more than $1 billion, according to the FBI, up from just $24 million paid in 2015. The spike in payments is increasing the velocity and variety of attacks exponentially: In 2017 ransomware on the dark market has grown by 2,500%. See More
Sponsored by Rackspace - Global organizations are expected to spend $1.2 trillion on digital transformation technologies in 2017, according to IDC. And going forward, this investment will grow to the tune of 18% a year, reaching $2 trillion in 2020. See More
Sponsored by NTT - Though the jury is still out over what constitutes successful digital transformation, there is no question about the immense excitement in this area as organizations seek to re-architect their IT environments to be more agile and responsive to modern business needs. See More
Sponsored by Dell EMC - Reduced costs is the No. 1 reason IT leaders are turning to hyper-converged infrastructure (HCI) as they strive to modernize their data centers, according to TechTarget Research. In a survey, nearly 50% of current users cited reduced cost as their top priority in deploying HCI, as did nearly 40% of prospective customers (see chart at bottom). See More
- April 25, 2014
A new report shows the volume of cloud attacks is rising, as attack types traditionally associated with on-premises environments migrate with users.
- April 01, 2014
Emerging cloud attacks threaten cloud data security by exploiting the gap between enterprise controls and provider transparency.
- March 04, 2014
Until a common cloud provider assessment paradigm is agreed upon, experts say enterprises will be left wanting on cloud data security validation.
- February 25, 2014
Panelists at the Cloud Security Alliance Summit assert that federated identity and gateways, hardly new technologies, are best for BYOD-SaaS security.
- January 22, 2014
The updated EU General Data Protection Regulation raises breach penalties for enterprises operating in the EU. Attorney Francois Gilbert explains.
- December 19, 2013
The Cloud Security Alliance hopes Cloud Trust Protocol will boost cloud transparency by automating customer requests for cloud provider security data.
- December 10, 2013
Video: CSA CEO Jim Reavis recaps the 2013 Cloud Security Alliance Congress, including its SAFECode partnership and Software Defined Perimeter effort.
- December 09, 2013
Nation-states are turning their attacks toward the cloud. One expert explains why he believes security automation is the only viable defense tactic.
- December 06, 2013
As business demands and rogue users introduce cloud computing security risks into many enterprises, infosec pros understand they must be enablers.
- December 05, 2013
A practitioner at the 2013 CSA Congress says enterprises must plan for a cloud incident because providers often fail to detail their responsibilities.