- June 24, 2016
At the 2016 Cloud Identity Summit, security experts discussed how fears of nation-state attackers and APT groups are spurring a renewed focus on identity and access management.
- June 07, 2016
SearchCloudSecurity talks with Frank Abagnale of Catch Me If You Can fame about the dangers of cybercrime and his work with the FBI as well as a new security startup.
- May 20, 2016
RSA Security's Rashmi Knowles spoke with SearchCloudSecurity about how new ransomware attacks are targeting cloud service providers and what enterprises can do about it.
- April 28, 2016
Chase Cunningham of Armor spoke with SearchCloudSecurity at RSA Conference 2016 about the value of secure cloud hosting services, threat intelligence and more.
- March 21, 2016
Netskope earned a patent for its CASB services delivery method, which intelligently "steers" enterprise traffic to cloud apps and applies security controls to those apps.
Sponsored by Intel - Hyperconverged infrastructure promises to make organisations more agile and cost-effective, with new storage technologies replacing legacy systems within a high-performance software-defined IT architecture. See More
Sponsored by IBM - IT decision-makers are under pressure to accelerate the performance of their databases in today’s era of exponential data growth, the internet of things and big data analytics. Mission-critical databases such as Oracle and Microsoft SQL Server must deliver more data more quickly to more locations to support modern business initiatives and digital transformation. See More
Sponsored by CloudHealth - As enterprises continue to add new use cases and workloads to their cloud portfolio, the stakes keep rising for potential governance speed bumps. Business users and IT professionals alike are now using the cloud for everything from compliance and security to cloud-native application development and infrastructure optimization. But this makes policy management more difficult, time consuming and costly, especially with so many cloud services being purchased and deployed outside the scope, visibility and control of a centralized IT operations group. See More
Sponsored by IBM - Now is the time to fully embrace SAP modernization. There is simply too much value in the data contained within SAP applications for any enterprise to risk missing out on potential digital transformation opportunities. See More
- March 04, 2016
Several CISOs discussed why cloud access security brokers are imperative to their respective enterprises during a panel discussion at RSA Conference 2016.
- March 02, 2016
Cloud access security brokers are dominating the cloud security conversation at this year's RSA Conference. Here's what vendors are saying about CASBs.
- March 02, 2016
Trend Micro's Mark Nunnikhoven said enterprises are often forced to deploy distinct cloud security controls for each type of service they deploy, making security unmanageable.
- March 01, 2016
During a panel discussion at RSA Conference 2016, representatives from top cloud providers such as Google and Microsoft discussed the legal battle between Apple and the FBI over encrypted data.
- February 29, 2016
During the CSA Summit at At RSA’s 2016 Conference, Netskope warned how cloud synchronization services can spread malware infection throughout an enterprise.
- February 10, 2016
Now that enterprise data is stored in clouds of all shapes and sizes, IT needs to provide more security options than ever. This ezine supplement focuses on the issue of cloud safety and zones in on three of the latest cloud developments and their ...
- February 03, 2016
The EU and U.S. agree on Privacy Shield as the replacement for the Safe Harbor framework for transatlantic data flows, though questions remain over privacy protection details.
- February 01, 2016
What companies and cloud security products do organizations consider when they see to reduce their cloud vulnerabilities?
- January 28, 2016
An advocacy group representing cloud providers such as Hewlett Packard Enterprise and IBM has criticized FedRAMP and called on the government to fix the cloud certification program.
- January 22, 2016
The security researcher behind the LostPass phishing attack on LastPass has criticized the company's reaction and responses to his findings.