January 2016
-
January 28, 2016
28
Jan'16
Industry group says FedRAMP certification process is 'broken'
An advocacy group representing cloud providers such as Hewlett Packard Enterprise and IBM has criticized FedRAMP and called on the government to fix the cloud certification program. Continue Reading
-
January 26, 2016
26
Jan'16
How Azure Security Center boosts Microsoft cloud security
Azure Security Center looks to enhance Microsoft's cloud platform by improving visibility and control. Expert Dave Shackleford outlines the features intended to do that. Continue Reading
-
January 22, 2016
22
Jan'16
How can a reverse proxy mode improve cloud security?
Skyhigh Networks recently obtained a patent to use reverse proxies for cloud access security broker services. Expert Dan Sullivan explains how the method works. Continue Reading
-
January 22, 2016
22
Jan'16
LostPass security researcher questions LastPass responses
The security researcher behind the LostPass phishing attack on LastPass has criticized the company's reaction and responses to his findings. Continue Reading
-
January 19, 2016
19
Jan'16
'LostPass' phishing attack targets LastPass credentials
A new proof-of-concept attack presented at ShmooCon 2016 exploits security weaknesses in cloud-based password manager LastPass and could allow attackers to gain control of users' accounts. Continue Reading
-
January 19, 2016
19
Jan'16
How to perform cloud-based application analysis
Before using cloud-based applications, it's important for enterprises to know their implications. Here are some static and dynamic application analysis techniques that can help. Continue Reading
-
January 15, 2016
15
Jan'16
What are the benefits of the Amazon API Gateway tool for AWS?
Can the new Amazon API Gateway help make the AWS public cloud networks more secure? Expert Dan Sullivan examines how this new tool can benefit enterprises. Continue Reading
-
January 13, 2016
13
Jan'16
RSA president outlines cloud security strategy, IDaaS plans
RSA President Amit Yoran discusses how the security vendor is changing its focus and explains how cloud security will play an important role in RSA's new strategy. Continue Reading
-
January 11, 2016
11
Jan'16
How APT groups are conducting public cloud attacks
Advanced persistent threat groups are using public cloud services to their advantage. Expert Ed Moyle explains how enterprises can protect themselves. Continue Reading
-
January 08, 2016
08
Jan'16
Are enterprise cloud management tools a security risk?
A tool that manages hybrid cloud environments can benefit enterprises, but there are also security risks to consider. Expert Dan Sullivan explains what those risks are. Continue Reading
-
January 05, 2016
05
Jan'16
Breaking down the Amazon EC2 key recovery attack
A research paper demonstrating a key recovery attack on Amazon Web Services' EC2 illustrates the risks of colocation and multi-tenancy in the cloud. Expert Rob Shapland explains. Continue Reading
-
January 04, 2016
04
Jan'16
Is Amazon Aurora's security strong enough for enterprises?
Without encryption for data at rest, is encrypting data in transit with Amazon Aurora enough, or is it worth waiting for AWS Key Management System integration? Continue Reading