Cloud Provisioning and Cloud Identity Management Issues
- January 24, 2020
Google Cloud's new Secret Manager service augments its cloud security capabilities with an eye toward the needs of DevOps teams.
- December 03, 2019
Amazon Web Services introduced the Access Analyzer tool at its re:Invent event. The new option aims to help users avoid accidentally exposing data stored in S3 buckets.
- August 09, 2018
At Black Hat 2018, a Netflix security engineer introduced a new open source tool designed to more effectively monitor AWS credentials in large cloud environments, like Netflix's.
- April 23, 2018
At RSA Conference 2018, CyberArk researchers described how threat actors are able to gain access to cloud environments and elevate privileges through 'shadow admins.'
- April 17, 2018
Why are enterprises still struggling with identity and access management in the cloud? Experts at RSA Conference discuss the issue and the risks posed by compromised credentials.
- January 17, 2018
Cloudflare takes inspiration from Google's BeyondCorp with a new service called Cloudflare Access, which aims to replace corporate VPNs and embrace perimeter-less security.
- September 19, 2016
At its OpenWorld Conference in San Francisco, Oracle announced an agreement to acquire cloud access security broker startup Palerra to get into the CASB market.
- August 31, 2016
SearchCloudSecurity's interview with Ping Identity CEO Andre Durand explores how distributed ledgers can be used for identity and access management.
- August 30, 2016
Ping Identity CEO Andre Durand talks with SearchCloudSecurity about the benefits of identity as a service as well as the issues holding back greater enterprise adoption of IDaaS.
- June 24, 2016
At the 2016 Cloud Identity Summit, security experts discussed how fears of nation-state attackers and APT groups are spurring a renewed focus on identity and access management.
- January 13, 2016
RSA President Amit Yoran discusses how the security vendor is changing its focus and explains how cloud security will play an important role in RSA's new strategy.
- December 10, 2015
Following its split from Juniper Networks, Pulse Secure looks to take on cloud access and authentication problems with a new product.
- September 30, 2015
Skyhigh Networks' patented method for providing cloud access security broker services uses a reverse proxy mode to provide authentication and policy controls.
- September 03, 2015
Security researchers discovered a new type of iOS malware that targets jailbroken devices and can allow attackers to take over the devices via iCloud.
- July 17, 2015
Healthcare organizations are increasing their cloud service usage, but is the cloud making them safer or creating more security issues?
- June 30, 2015
Open standards around identity and authentication are gaining popularity. So what -- and who -- is driving the movement?
- June 09, 2015
At the Cloud Identity Summit this week, Ping introduced a new platform as well as support for the Apple Watch and Yubico's YubiKey.
- May 08, 2015
Cloud access security brokers Adallom and Elastica recently struck major partnerships with Hewlett-Packard and Cisco, respectively, to improve SaaS security and cloud visibility.
- May 01, 2015
Azure CTO Mark Russinovich offered a behind-the-scenes look at Microsoft's cloud security practices and customer case studies at RSA Conference 2015.
- April 02, 2015
In the cloud security realm, experts say improved cloud visibility and big data analytics are expected to be major themes at this year's RSA Conference.
- March 20, 2015
Experts say attacks on cloud application credentials are increasing, and vulnerability scans and penetration tests can't tell if an account has been compromised.
- January 09, 2015
Cloud Security Alliance findings show many enterprises struggle to identify and control shadow cloud apps and services; half of those surveyed told the CSA they have no program in place manage cloud apps and services.
- November 05, 2014
With IBM Dynamic Cloud Security, Big Blue is shifting its entire security portfolio, from managed services to threat analytics, to the cloud.
- July 15, 2014
Exclusive: The co-founder of One More Cloud explains how an old AWS API key was used to take down the company's services, and the hard lessons learned.
- November 29, 2012
Using AWS IAM tools to limit who has access to create and launch services should be essential to a cloud security strategy, say experts.
- June 14, 2012
Okta service streamlines unmanageable number of accounts and passwords for Genomic Health.
- November 22, 2011
One mistake by a developer could expose an organization’s AWS infrastructure, security researcher says.
- September 20, 2011
Market for cloud-based identity and access management is growing, analysts say.
- February 09, 2011
Encryption, server security and identity and access management for cloud services among the new offerings.
- May 06, 2010
An (ISC)2 survey finds federal CISOs pleased with the government's efforts to improve network security, but lack support for hiring skilled security pros.
- September 21, 2009
Panel discusses cloud computing security issues including encryption and user authentication.