New & Notable
Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus News
October 17, 2014
News roundup: New research shows a dramatic increase in the cost of cybercrime and data breach remediation. Plus: Security as a service popularity surges, Snowden journalist touts the importance of free security software, and more.
October 07, 2014
Sophos looks to strengthen its cloud security offerings for mobile security with the acquisition of Mojave Networks, a mobile security startup.
September 02, 2014
CERN and the Cloud Security Alliance explain how federated identity management protects Helix Nebula, a European cloud platform that's running applications for such research projects as the Large Hadron Collider.
August 12, 2014
IBM made its second cloud security acquisition in as many weeks with the purchase of Lighthouse Security Group, which specializes in cloud-based IAM services.
Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus Get Started
Bring yourself up to speed with our introductory content
The Cloud Security Alliance (CSA) is a nonprofit organization that promotes best practices for securing cloud computing and provides information on the ability of cloud computing to secure other forms of computing. The industry group also provides ... Continue Reading
Evaluate Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Finding the cloud-based identity and access management services and providers that meet your enterprise's needs can be challenging. Dave Shackleford offers the inside scoop on some of today's top cloud provider's IAM offerings. Continue Reading
While cloud-based identity and access management services offer numerous benefits to enterprises, there are also a number of drawbacks. Learn the risks and rewards of cloud IAM. Continue Reading
Developing a secure API design in a cloud environment can be challenging. Expert Dejan Lukan explains what enterprises need to remember when building a secure API. Continue Reading
Product ReviewsPowered by IT Central Station
Powered by IT Central Station
Confidence is key when it comes to managing large IT systems. The tricky part is when a CIO tries to generate the trust and confidence of a...Continue Reading
Manage Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus
Learn to apply best practices and optimize your operations.
While using the cloud for identity and access management can simplify the task, it is critical to consider a number of factors when implementing cloud IAM products and services. Expert Dave Shackleford explains. Continue Reading
This Security School covers need-to-know information about cloud-based identity and access management, including best practices as well as its pros and cons. Continue Reading
Trustwave's Charles Henderson spoke with Editorial Director Robert Richardson about the company's on-demand penetration testing services. Continue Reading
Problem Solve Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Discover the benefits of cloud-based DDoS mitigation and uncover when a cloud service is more viable than in-house DDoS protection. Continue Reading
When evaluating website security service providers, expert Michael Cobb says be sure to ask for qualifications, references and past work examples. Continue Reading
Expert Ed Moyle analyzes five key cloud computing security concerns vexing enterprises and the emerging products that are attempting to address them. Continue Reading