- April 25, 2018
At RSA Conference 2018, SentinelOne CEO Tomer Weingarten talks with SearchSecurity about his company's shift to the cloud and what it means for endpoint security.
- April 23, 2018
At RSA Conference 2018, CyberArk researchers described how threat actors are able to gain access to cloud environments and elevate privileges through 'shadow admins.'
- April 17, 2018
Why are enterprises still struggling with identity and access management in the cloud? Experts at RSA Conference discuss the issue and the risks posed by compromised credentials.
- February 01, 2018
A new study on cloud data security provides insights into the shaken confidence in the cloud. Despite its increased use, payment and customer data still appears to be at risk.
- January 17, 2018
Cloudflare takes inspiration from Google's BeyondCorp with a new service called Cloudflare Access, which aims to replace corporate VPNs and embrace perimeter-less security.
Sponsored by IBM - There’s a new mantra in endpoint management: A device is a device is a device. If you’re in IT or security, you have to treat every device the same way, no matter the format or operating system version. The answer? A UEM with cognitive capabilities. See More
Sponsored by IBM - UEM provides the appropriate levels of productivity and security functionality to support your entire environment of smartphones, tablets, laptops, desktops, wearables and IoT. Here are the top 10 things to look for in a solution. See More
Sponsored by IBM - When used in combination, UEM and AI/cognitive technologies deliver an intelligent advantage that results in cost savings, reduced complexity and productivity gains. It’s time to stop using yesterday’s technologies to address tomorrow’s challenges. See More
Sponsored by IBM - Enterprises need a tool that provides centralized visibility, control, and security for all endpoints, users, applications, content, and data. With unified endpoint management, IT can finally modernize endpoint management and security. Here’s how. See More
- November 28, 2017
In its first big post-Intel move, McAfee agreed to acquire Skyhigh Networks, a leading cloud access security broker, to strengthen its presence in the cloud security market.
- July 25, 2017
G Suite security faced similar issues to Amazon Web Services, as misconfigured access permissions could have exposed sensitive information from hundreds of Google Groups.
- July 19, 2017
Following a number of data leaks related to improper AWS S3 bucket policies, Amazon has begun sending warning emails to users with public permissions.
- February 14, 2017
At RSA Conference 2017, Tenable Network Security introduced a cloud-based vulnerability management platform called Tenable.io that allows users to import and export vulnerability data.
- February 13, 2017
At RSA Conference 2017, Skyhigh Networks explained how it expanded its cloud access security broker model to include IaaS platforms and custom enterprise applications.
- February 13, 2017
The Cloud Security Alliance unveiled new research at RSA Conference 2017 that shows custom enterprise applications are creating shadow cloud computing risks for organizations.
- September 30, 2016
Microsoft's 'million-dollar bug detector' on offer in preview of Project Springfield, an Azure-based fuzz testing service announced at Ignite 2016.
- September 19, 2016
At its OpenWorld Conference in San Francisco, Oracle announced an agreement to acquire cloud access security broker startup Palerra to get into the CASB market.
- September 14, 2016
Netskope cloud report reveals growth in threat from cloud ransomware as infected enterprises average 26 files carrying malware, over half of infected files shared publicly.
- September 12, 2016
Cloud POS provider Lightspeed reports a 'security incident,' reminds customers to change passwords and developers to implement OAuth 2.0 for improved authentication.