Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus News
March 20, 2015
Experts say attacks on cloud application credentials are increasing, and vulnerability scans and penetration tests can't tell if an account has been compromised.
February 26, 2015
Google's new cloud security scanner aims to make application vulnerability scanning easier for Google App Engine developers.
February 06, 2015
MeriTalk and Palo Alto Networks say the U.S. government's thinks its data center modernization effort is going well, but research shows basic cloud security protections are nowhere to be found.
January 30, 2015
As DDoS attacks get bigger, more frequent, and more varied, new hybrid and cloud-based DDoS prevention methods are emerging, but some fear too much automation in DDoS defense may result in a loss of control.
Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus Get Started
Bring yourself up to speed with our introductory content
Video: Dave Shackleford defines threat intelligence for cybersecurity and highlights two key trends affecting its evolution within enterprises. Continue Reading
The votes are tallied. The readers have spoken. Information Security is honoring readers’ picks for the best security hardware, appliances and services in our ninth-annual Readers’ Choice Awards. Continue Reading
The Cloud Security Alliance (CSA) is a nonprofit organization that promotes best practices for securing cloud computing and provides information on the ability of cloud computing to secure other forms of computing. The industry group also provides ... Continue Reading
Evaluate Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The threat modeling process for cloud security is multifaceted. Expert Ravila Helen White breaks it down into a few key aspects. Continue Reading
Cloud data loss prevention offers many advantages to enterprises today, but it is not without challenges. Expert Rob Shapland discusses the issues to be aware of. Continue Reading
Readers vote on the best cloud security products of 2014. Continue Reading
Product ReviewsPowered by IT Central Station
Makes many promises but in order to do so, Qualys requires the client to provide a backdoor to the system.Powered by IT Central Station
The QualysGuard Private Cloud Platform (QG PCP) makes many promises, one of which is that vulnerability scan data can be hosted by a private...Continue Reading
Powered by IT Central Station
Confidence is key when it comes to managing large IT systems. The tricky part is when a CIO tries to generate the trust and confidence of a...Continue Reading
Manage Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus
Learn to apply best practices and optimize your operations.
While using the cloud for identity and access management can simplify the task, it is critical to consider a number of factors when implementing cloud IAM products and services. Expert Dave Shackleford explains. Continue Reading
Finding the cloud-based identity and access management services and providers that meet your enterprise's needs can be challenging. Dave Shackleford offers the inside scoop on some of today's top cloud provider's IAM offerings. Continue Reading
This Security School covers need-to-know information about cloud-based identity and access management, including best practices as well as its pros and cons. Continue Reading
Problem Solve Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Discover the benefits of cloud-based DDoS mitigation and uncover when a cloud service is more viable than in-house DDoS protection. Continue Reading
When evaluating website security service providers, expert Michael Cobb says be sure to ask for qualifications, references and past work examples. Continue Reading
Expert Ed Moyle analyzes five key cloud computing security concerns vexing enterprises and the emerging products that are attempting to address them. Continue Reading