- January 19, 2016
A new proof-of-concept attack presented at ShmooCon 2016 exploits security weaknesses in cloud-based password manager LastPass and could allow attackers to gain control of users' accounts.
- January 13, 2016
RSA President Amit Yoran discusses how the security vendor is changing its focus and explains how cloud security will play an important role in RSA's new strategy.
- December 16, 2015
Security researchers at Zscaler discovered a new Spy Banker Trojan campaign that's leveraging Google's public cloud services as a hosting platform.
- December 10, 2015
Following its split from Juniper Networks, Pulse Secure looks to take on cloud access and authentication problems with a new product.
- December 03, 2015
FireEye researchers discovered an advanced persistent threat group that used Dropbox to launch a spear phishing campaign against Hong Kong media companies.
Sponsored by Intel - Hyperconverged infrastructure promises to make organisations more agile and cost-effective, with new storage technologies replacing legacy systems within a high-performance software-defined IT architecture. See More
Sponsored by IBM - IT decision-makers are under pressure to accelerate the performance of their databases in today’s era of exponential data growth, the internet of things and big data analytics. Mission-critical databases such as Oracle and Microsoft SQL Server must deliver more data more quickly to more locations to support modern business initiatives and digital transformation. See More
Sponsored by CloudHealth - As enterprises continue to add new use cases and workloads to their cloud portfolio, the stakes keep rising for potential governance speed bumps. Business users and IT professionals alike are now using the cloud for everything from compliance and security to cloud-native application development and infrastructure optimization. But this makes policy management more difficult, time consuming and costly, especially with so many cloud services being purchased and deployed outside the scope, visibility and control of a centralized IT operations group. See More
Sponsored by IBM - Now is the time to fully embrace SAP modernization. There is simply too much value in the data contained within SAP applications for any enterprise to risk missing out on potential digital transformation opportunities. See More
- November 24, 2015
After acquiring two cloud access security brokers this year, Blue Coat Systems has united CASB capabilities with its Web gateway security technology under a new cloud security strategy.
- November 10, 2015
After acquiring Perspecsys this summer, Blue Coat Systems makes another CASB deal for Elastica to further strengthen its cloud security presence.
- November 06, 2015
Dropbox stepped up its security offerings this week with the introduction of Dropbox Enterprise and several new cloud security controls for business customers.
- October 30, 2015
A critical Xen hypervisor security flaw that allows attackers to access host operating systems and had gone undiscovered for several years was finally patched this week.
- October 28, 2015
Intel Security unexpectedly moved several McAfee SaaS endpoint and email security products to end of life just prior to announcing a new corporate strategy this week.
- October 23, 2015
The negative effects of U.S. government surveillance have put cloud providers in a tough spot and left security vendors scrambling for better privacy protections.
- October 02, 2015
Following its shift to a managed cloud services model, Rackspace has moved into the managed security and compliance services space.
- October 01, 2015
Brian Krebs, Art Coviello and Kris Lovejoy tackle government conflicts and cybersecurity shortcomings at the Privacy. Security. Risk. 2015 event.
- September 30, 2015
Skyhigh Networks' patented method for providing cloud access security broker services uses a reverse proxy mode to provide authentication and policy controls.
- September 25, 2015
Former RSA chairman Art Coviello said the U.S. government and cybersecurity industry need to work together to solve growing issues around cloud security and privacy.