- March 27, 2015
A new report on government cybersecurity efforts delivered some troubling findings for the federal government's cloud operations.
- March 20, 2015
Experts say attacks on cloud application credentials are increasing, and vulnerability scans and penetration tests can't tell if an account has been compromised.
- March 10, 2015
In a surprise move, Amazon Web services was able to patch a Xen hypervisor security flaw without a mass reboot of its EC2 infrastructure. So how did AWS pull it off?
- March 06, 2015
The Cloud Security Alliance's new frameworks for the European Union offer baseline security measures for government agencies worldwide deploying secure cloud services.
- February 26, 2015
Google's new cloud security scanner aims to make application vulnerability scanning easier for Google App Engine developers.
Sponsored by Akamai - Visiting a website today, users gain access to a rich, interactive experience that is often customized to their preferences and enhanced for their convenience. See More
Sponsored by IBM - IT decision-makers are under pressure to accelerate the performance of their databases in today’s era of exponential data growth, the internet of things and big data analytics. Mission-critical databases such as Oracle and Microsoft SQL Server must deliver more data more quickly to more locations to support modern business initiatives and digital transformation. See More
Sponsored by Akamai - At a time when many businesses have their resources stretched to the limit, the scourge of distributed denial-of-service (DDoS) attacks has continued unabated and added to the difficulties faced by many during this ongoing pandemic. See More
Reduce Network Complexity and Empower Your Hybrid Cloud with a Modern, Software-Defined Architecture
Sponsored by IBM - As IT teams seek to move more of their mission-critical applications to hybrid cloud environments, they are facing growing pressure to reduce complexity in managing, securing and scaling their enterprise networks. See More
- February 26, 2015
Security and privacy remain a stumbling block for cloud computing, according to information experts at the Trust in the Digital World conference
- February 18, 2015
After nearly three years, the Symantec Certified Professional-Cloud Security certification has been discontinued due to a lack of adoption, causing observers to question Symantec's cloud security strategy.
- February 10, 2015
Box will give enterprise cloud data storage customers the ability to control and store their own encryption keys through its new Enterprise Key Management service.
- February 06, 2015
MeriTalk and Palo Alto Networks say the U.S. government's thinks its data center modernization effort is going well, but research shows basic cloud security protections are nowhere to be found.
- February 04, 2015
New research by CipherCloud shows that majority of enterprises don't know extent of unsanctioned cloud usage by their employees.
- January 30, 2015
According to a new patent application, Apple is looking to expand its Touch ID biometric verification system through the cloud. But will the biometric data be secure?
- January 30, 2015
As DDoS attacks get bigger, more frequent, and more varied, new hybrid and cloud-based DDoS prevention methods are emerging, but some fear too much automation in DDoS defense may result in a loss of control.
- January 26, 2015
Rackspace hopes its new emphasis on security-centric managed cloud services will be enough to overcome past security and availability problems, as well as differentiate itself from public cloud rivals AWS and Microsoft.
- January 16, 2015
Cloud collaboration firm Ribose became the first company to achieve the Cloud Security Alliance's STAR Attestation process.
- January 09, 2015
Cloud Security Alliance findings show many enterprises struggle to identify and control shadow cloud apps and services; half of those surveyed told the CSA they have no program in place manage cloud apps and services.
- January 05, 2015
A hacking tool released on New Year's Day highlighted a security hole in Apple's public cloud service that left user accounts vulnerable.
- August 07, 2014
At Black Hat 2014, a researcher showed how AWS cloud security flaws and misconfigurations can have devastating consequences for AWS customers that don't take security seriously.
- July 18, 2014
The Cloud Security Alliance has updated its Cloud Controls Matrix (CCM) and Consensus Assessments Questionnaire (CAIQ) to help enterprises standardize cloud provider security assessments.
- July 15, 2014
Verizon bolstered its cloud security presence with a new web application firewall. The cloud-based WAF puts the telecom giant in the growing cloud firewall market with Akamai, Imperva and others.
- November 05, 2012
Some firms struggled while others smoothly executed disaster procedures. Experts said cloud computing aided data center resiliency.
- November 01, 2012
Managing information, providing strong access controls and setting up appropriate data destruction policies are a challenge, experts say.
- September 19, 2012
Using the cloud can streamline secure software development, but comes with challenges and risks.
- August 31, 2012
CSA will work with Fujitsu Laboratories of America on best practices, standards for securing big data.
- July 24, 2012
Amazon Web Services has filed details on its security controls with Cloud Security Alliance online registry, showing a new level of transparency.
- May 30, 2012
Law firm study of 10 countries finds that all allow government to access cloud data
- March 23, 2012
Software giant said it will apply lessons learned after Leap Day outage of its cloud service.
- March 13, 2012
How will security pros’ jobs change as cloud use grows?
- October 03, 2011
Co-chair of CSA project talks about the CCM and how organizations can leverage it.
- July 29, 2011
Gartner advises companies to take responsibility for cloud service resiliency.
- July 25, 2011
Guide explains how organizations can leverage COBIT to manage their cloud computing environments.
- April 20, 2011
Companies moving legacy applications to a cloud environment need to account for a different threat model, loss of control.
- February 04, 2011
Companies are worried about compliance and data protection in the cloud, according to a reader survey.