- March 27, 2015
A new report on government cybersecurity efforts delivered some troubling findings for the federal government's cloud operations.
- March 20, 2015
Experts say attacks on cloud application credentials are increasing, and vulnerability scans and penetration tests can't tell if an account has been compromised.
- March 10, 2015
In a surprise move, Amazon Web services was able to patch a Xen hypervisor security flaw without a mass reboot of its EC2 infrastructure. So how did AWS pull it off?
- March 06, 2015
The Cloud Security Alliance's new frameworks for the European Union offer baseline security measures for government agencies worldwide deploying secure cloud services.
- February 26, 2015
Google's new cloud security scanner aims to make application vulnerability scanning easier for Google App Engine developers.
Sponsored by VMware - Pennsylvania Lumbermens Mutual Insurance Company, a property and casualty insurance carrier serving the lumber and building materials industries, finds it crucial to maintain business continuity while keeping IT operations lean. Faction, a leading Managed Service Provider and VMware Cloud Verified partner played an important role in PLM’s evolution to the cloud, first providing a hosted private cloud and then helping PLM move to VMware Cloud on AWS. See More
Sponsored by Microsoft - With the shift to remote work caused by COVID-19, Security Operations Centers (SOCs) are under more pressure than ever, particularly with many SOC workers also working from home. Today’s reality is that SOCs have to embrace a new way of working in order to keep their analysts and admins effective and to ensure that morale doesn’t collapse under the weight of too much work and pressure. See More
Sponsored by VMware - IDC spoke with organizations to understand the IT and business impacts of running applications on VMware Cloud™ on AWS compared to running them on other public cloud solutions. See More
Sponsored by Microsoft - COVID-19 has been, and continues to be, a stark reminder of the importance of business resilience. Organizations of all types and sizes have had to adjust to rapidly changing and unpredictable circumstances: A shift to remote work, supply chain disruptions, new digitally driven business models and an environment where uncertainty is the rule, not the exception. See More
- February 26, 2015
Security and privacy remain a stumbling block for cloud computing, according to information experts at the Trust in the Digital World conference
- February 18, 2015
After nearly three years, the Symantec Certified Professional-Cloud Security certification has been discontinued due to a lack of adoption, causing observers to question Symantec's cloud security strategy.
- February 10, 2015
Box will give enterprise cloud data storage customers the ability to control and store their own encryption keys through its new Enterprise Key Management service.
- February 06, 2015
MeriTalk and Palo Alto Networks say the U.S. government's thinks its data center modernization effort is going well, but research shows basic cloud security protections are nowhere to be found.
- February 04, 2015
New research by CipherCloud shows that majority of enterprises don't know extent of unsanctioned cloud usage by their employees.
- January 30, 2015
According to a new patent application, Apple is looking to expand its Touch ID biometric verification system through the cloud. But will the biometric data be secure?
- January 30, 2015
As DDoS attacks get bigger, more frequent, and more varied, new hybrid and cloud-based DDoS prevention methods are emerging, but some fear too much automation in DDoS defense may result in a loss of control.
- January 26, 2015
Rackspace hopes its new emphasis on security-centric managed cloud services will be enough to overcome past security and availability problems, as well as differentiate itself from public cloud rivals AWS and Microsoft.
- January 16, 2015
Cloud collaboration firm Ribose became the first company to achieve the Cloud Security Alliance's STAR Attestation process.
- January 09, 2015
Cloud Security Alliance findings show many enterprises struggle to identify and control shadow cloud apps and services; half of those surveyed told the CSA they have no program in place manage cloud apps and services.
- January 05, 2015
A hacking tool released on New Year's Day highlighted a security hole in Apple's public cloud service that left user accounts vulnerable.
- August 15, 2014
Amazon Web Services has added multifactor authentication to its WorkSpaces cloud desktop service, the first step in a larger effort to bolster AWS security.
- August 07, 2014
At Black Hat 2014, a researcher showed how AWS cloud security flaws and misconfigurations can have devastating consequences for AWS customers that don't take security seriously.
- November 05, 2012
Some firms struggled while others smoothly executed disaster procedures. Experts said cloud computing aided data center resiliency.
- November 01, 2012
Managing information, providing strong access controls and setting up appropriate data destruction policies are a challenge, experts say.
- September 19, 2012
Using the cloud can streamline secure software development, but comes with challenges and risks.
- July 24, 2012
Amazon Web Services has filed details on its security controls with Cloud Security Alliance online registry, showing a new level of transparency.
- May 30, 2012
Law firm study of 10 countries finds that all allow government to access cloud data
- March 23, 2012
Software giant said it will apply lessons learned after Leap Day outage of its cloud service.
- March 13, 2012
How will security pros’ jobs change as cloud use grows?
- October 03, 2011
Co-chair of CSA project talks about the CCM and how organizations can leverage it.
- July 29, 2011
Gartner advises companies to take responsibility for cloud service resiliency.
- July 25, 2011
Guide explains how organizations can leverage COBIT to manage their cloud computing environments.
- April 20, 2011
Companies moving legacy applications to a cloud environment need to account for a different threat model, loss of control.
- March 22, 2011
Mario Santana, vice president of secure information services, talks about security risks unique to the cloud, how Terremark addresses them, and how it responds to subpoenas.
- February 04, 2011
Companies are worried about compliance and data protection in the cloud, according to a reader survey.