- March 27, 2015
A new report on government cybersecurity efforts delivered some troubling findings for the federal government's cloud operations.
- March 20, 2015
Experts say attacks on cloud application credentials are increasing, and vulnerability scans and penetration tests can't tell if an account has been compromised.
- March 10, 2015
In a surprise move, Amazon Web services was able to patch a Xen hypervisor security flaw without a mass reboot of its EC2 infrastructure. So how did AWS pull it off?
- March 06, 2015
The Cloud Security Alliance's new frameworks for the European Union offer baseline security measures for government agencies worldwide deploying secure cloud services.
- February 26, 2015
Google's new cloud security scanner aims to make application vulnerability scanning easier for Google App Engine developers.
Sponsored by Forcepoint - Organizations of all sizes have been called upon to swiftly support remote work in order to safeguard the health of their workforce and local communities. As businesses are called upon to scale up remote work procedures for the physical safety of employees, IT teams must accelerate the adoption of technology that ensures their people and data are secure—without hurting productivity or morale. See More
Sponsored by Intel - IT leaders are preparing their organisations for increasing use of artificial intelligence (AI) to extract the insights they need from growing amounts of data. To help them, Intel is enabling businesses to future-proof their IT architecture by building AI accelerators into its second-generation Xeon® scalable processors. See More
Sponsored by IBM - IT decision-makers are under pressure to accelerate the performance of their databases in today’s era of exponential data growth, the internet of things and big data analytics. Mission-critical databases such as Oracle and Microsoft SQL Server must deliver more data more quickly to more locations to support modern business initiatives and digital transformation. See More
Sponsored by Forcepoint - As security teams are tasked with the duty of rapidly scaling up protections for remote workers, one of the key considerations they must keep in mind is how to safeguard data no matter where it resides or travels. This is hardly a new problem. However, the vastly broadened scope of remote work today requires security teams to revisit policies and technologies. Some solutions that may have been sufficient for isolated use cases don't adequately protect a completely distributed workforce. See More
- February 26, 2015
Security and privacy remain a stumbling block for cloud computing, according to information experts at the Trust in the Digital World conference
- February 18, 2015
After nearly three years, the Symantec Certified Professional-Cloud Security certification has been discontinued due to a lack of adoption, causing observers to question Symantec's cloud security strategy.
- February 10, 2015
Box will give enterprise cloud data storage customers the ability to control and store their own encryption keys through its new Enterprise Key Management service.
- February 06, 2015
MeriTalk and Palo Alto Networks say the U.S. government's thinks its data center modernization effort is going well, but research shows basic cloud security protections are nowhere to be found.
- February 04, 2015
New research by CipherCloud shows that majority of enterprises don't know extent of unsanctioned cloud usage by their employees.
- January 30, 2015
According to a new patent application, Apple is looking to expand its Touch ID biometric verification system through the cloud. But will the biometric data be secure?
- January 30, 2015
As DDoS attacks get bigger, more frequent, and more varied, new hybrid and cloud-based DDoS prevention methods are emerging, but some fear too much automation in DDoS defense may result in a loss of control.
- January 26, 2015
Rackspace hopes its new emphasis on security-centric managed cloud services will be enough to overcome past security and availability problems, as well as differentiate itself from public cloud rivals AWS and Microsoft.
- January 16, 2015
Cloud collaboration firm Ribose became the first company to achieve the Cloud Security Alliance's STAR Attestation process.
- January 09, 2015
Cloud Security Alliance findings show many enterprises struggle to identify and control shadow cloud apps and services; half of those surveyed told the CSA they have no program in place manage cloud apps and services.
- January 05, 2015
A hacking tool released on New Year's Day highlighted a security hole in Apple's public cloud service that left user accounts vulnerable.
- August 07, 2014
At Black Hat 2014, a researcher showed how AWS cloud security flaws and misconfigurations can have devastating consequences for AWS customers that don't take security seriously.
- July 18, 2014
The Cloud Security Alliance has updated its Cloud Controls Matrix (CCM) and Consensus Assessments Questionnaire (CAIQ) to help enterprises standardize cloud provider security assessments.
- July 15, 2014
Verizon bolstered its cloud security presence with a new web application firewall. The cloud-based WAF puts the telecom giant in the growing cloud firewall market with Akamai, Imperva and others.
- November 05, 2012
Some firms struggled while others smoothly executed disaster procedures. Experts said cloud computing aided data center resiliency.
- November 01, 2012
Managing information, providing strong access controls and setting up appropriate data destruction policies are a challenge, experts say.
- September 19, 2012
Using the cloud can streamline secure software development, but comes with challenges and risks.
- August 31, 2012
CSA will work with Fujitsu Laboratories of America on best practices, standards for securing big data.
- July 24, 2012
Amazon Web Services has filed details on its security controls with Cloud Security Alliance online registry, showing a new level of transparency.
- May 30, 2012
Law firm study of 10 countries finds that all allow government to access cloud data
- March 23, 2012
Software giant said it will apply lessons learned after Leap Day outage of its cloud service.
- March 13, 2012
How will security pros’ jobs change as cloud use grows?
- October 03, 2011
Co-chair of CSA project talks about the CCM and how organizations can leverage it.
- July 29, 2011
Gartner advises companies to take responsibility for cloud service resiliency.
- July 25, 2011
Guide explains how organizations can leverage COBIT to manage their cloud computing environments.
- April 20, 2011
Companies moving legacy applications to a cloud environment need to account for a different threat model, loss of control.
- February 04, 2011
Companies are worried about compliance and data protection in the cloud, according to a reader survey.