- December 07, 2018
News roundup: A critical Kubernetes vulnerability was found in the system's API server and could have a wide reach. Plus, ESET found 21 new Linux malware families, and more.
- October 04, 2018
Palo Alto Networks looks to bolster its cloud security portfolio with a $173 million acquisition of cloud security startup RedLock and integrate it with Evident.io technologies.
- August 09, 2018
At Black Hat 2018, a Netflix security engineer introduced a new open source tool designed to more effectively monitor AWS credentials in large cloud environments, like Netflix's.
- June 12, 2018
Security researchers discovered an unsecured Kubernetes console leading to a Weight Watchers exposure, but, allegedly, no personal data was leaked as a result of the issue.
- June 08, 2018
Amazon Web Services and Google Groups have seen data exposures due to poor configurations by users. Now, some have accidentally shared passwords on Trello boards.
Sponsored by Intel - Hyperconverged infrastructure promises to make organisations more agile and cost-effective, with new storage technologies replacing legacy systems within a high-performance software-defined IT architecture. See More
Sponsored by IBM - IT decision-makers are under pressure to accelerate the performance of their databases in today’s era of exponential data growth, the internet of things and big data analytics. Mission-critical databases such as Oracle and Microsoft SQL Server must deliver more data more quickly to more locations to support modern business initiatives and digital transformation. See More
Sponsored by CloudHealth - As enterprises continue to add new use cases and workloads to their cloud portfolio, the stakes keep rising for potential governance speed bumps. Business users and IT professionals alike are now using the cloud for everything from compliance and security to cloud-native application development and infrastructure optimization. But this makes policy management more difficult, time consuming and costly, especially with so many cloud services being purchased and deployed outside the scope, visibility and control of a centralized IT operations group. See More
Sponsored by IBM - Now is the time to fully embrace SAP modernization. There is simply too much value in the data contained within SAP applications for any enterprise to risk missing out on potential digital transformation opportunities. See More
- April 25, 2018
At RSA Conference 2018, SentinelOne CEO Tomer Weingarten talks with SearchSecurity about his company's shift to the cloud and what it means for endpoint security.
- April 23, 2018
At RSA Conference 2018, CyberArk researchers described how threat actors are able to gain access to cloud environments and elevate privileges through 'shadow admins.'
- April 17, 2018
Why are enterprises still struggling with identity and access management in the cloud? Experts at RSA Conference discuss the issue and the risks posed by compromised credentials.
- February 01, 2018
A new study on cloud data security provides insights into the shaken confidence in the cloud. Despite its increased use, payment and customer data still appears to be at risk.
- January 17, 2018
Cloudflare takes inspiration from Google's BeyondCorp with a new service called Cloudflare Access, which aims to replace corporate VPNs and embrace perimeter-less security.
- November 28, 2017
In its first big post-Intel move, McAfee agreed to acquire Skyhigh Networks, a leading cloud access security broker, to strengthen its presence in the cloud security market.
- July 25, 2017
G Suite security faced similar issues to Amazon Web Services, as misconfigured access permissions could have exposed sensitive information from hundreds of Google Groups.
- July 19, 2017
Following a number of data leaks related to improper AWS S3 bucket policies, Amazon has begun sending warning emails to users with public permissions.
- February 14, 2017
At RSA Conference 2017, Tenable Network Security introduced a cloud-based vulnerability management platform called Tenable.io that allows users to import and export vulnerability data.
- February 13, 2017
At RSA Conference 2017, Skyhigh Networks explained how it expanded its cloud access security broker model to include IaaS platforms and custom enterprise applications.