- May 30, 2014
Security pros say infosec teams must be proactive on cloud security management to reduce risk related to rapid growth in enterprise cloud computing.
- May 29, 2014
The consequences for cloud service providers missing the FedRAMP deadline remain unclear, though experts say those in the queue are in good shape.
- May 07, 2014
A Netskope report shows a flood of cloud security policy exceptions commonly thwart rogue cloud app security controls.
- April 25, 2014
A new report shows the volume of cloud attacks is rising, as attack types traditionally associated with on-premises environments migrate with users.
- April 01, 2014
Emerging cloud attacks threaten cloud data security by exploiting the gap between enterprise controls and provider transparency.
Sponsored by DellEMC - Is yours one of those organisations that has been on the sidelines for Windows 10 or has migrated only a portion of its user base? If so, your users and IT teams are missing out on a wide range of benefits — including improved security, greater performance, simplified operations and maintenance, and enhanced support for cloud environments. See More
Sponsored by Rackspace - Businesses must deliver a consistent high-value experience—or risk losing customers to someone who can. And they’re turning to big data technologies to help. With big data analytics, organizations can get to know their customers better, learn their habits and anticipate their needs to deliver a better customer experience. See More
Sponsored by Dell EMC - In today’s business environment, software has become a critical differentiator in determining business success. A recent article in Harvard Business Review postulates that every business is a competitor on a software playing field, no matter what sector it is in. See More
Sponsored by DellEMC - Security threats are becoming more advanced, targeted and sophisticated. Unfortunately, we see the results in the news regularly, with recent attacks such as WannaCry and Petya crippling organisations worldwide. Endpoints remain by far the No. 1 source of security breaches — for certain types of breaches, 95% occur at the endpoint. See More
- March 04, 2014
Until a common cloud provider assessment paradigm is agreed upon, experts say enterprises will be left wanting on cloud data security validation.
- February 25, 2014
Panelists at the Cloud Security Alliance Summit assert that federated identity and gateways, hardly new technologies, are best for BYOD-SaaS security.
- January 22, 2014
The updated EU General Data Protection Regulation raises breach penalties for enterprises operating in the EU. Attorney Francois Gilbert explains.
- December 19, 2013
The Cloud Security Alliance hopes Cloud Trust Protocol will boost cloud transparency by automating customer requests for cloud provider security data.
- December 10, 2013
Video: CSA CEO Jim Reavis recaps the 2013 Cloud Security Alliance Congress, including its SAFECode partnership and Software Defined Perimeter effort.
- December 09, 2013
Nation-states are turning their attacks toward the cloud. One expert explains why he believes security automation is the only viable defense tactic.
- December 06, 2013
As business demands and rogue users introduce cloud computing security risks into many enterprises, infosec pros understand they must be enablers.
- December 05, 2013
A practitioner at the 2013 CSA Congress says enterprises must plan for a cloud incident because providers often fail to detail their responsibilities.
- December 05, 2013
At the 2013 CSA Congress, executives from Microsoft and AWS made the case for why cloud provider security is superior to traditional IT security.
- October 14, 2013
Startup vendor Netskope released a report detailing cloud app security ratings, but the company's CEO warned against simply blocking riskier apps.