- January 19, 2016
A new proof-of-concept attack presented at ShmooCon 2016 exploits security weaknesses in cloud-based password manager LastPass and could allow attackers to gain control of users' accounts.
- January 13, 2016
RSA President Amit Yoran discusses how the security vendor is changing its focus and explains how cloud security will play an important role in RSA's new strategy.
- December 16, 2015
Security researchers at Zscaler discovered a new Spy Banker Trojan campaign that's leveraging Google's public cloud services as a hosting platform.
- December 10, 2015
Following its split from Juniper Networks, Pulse Secure looks to take on cloud access and authentication problems with a new product.
- December 03, 2015
FireEye researchers discovered an advanced persistent threat group that used Dropbox to launch a spear phishing campaign against Hong Kong media companies.
Sponsored by CloudHealth - As enterprises continue to add new use cases and workloads to their cloud portfolio, the stakes keep rising for potential governance speed bumps. Business users and IT professionals alike are now using the cloud for everything from compliance and security to cloud-native application development and infrastructure optimization. But this makes policy management more difficult, time consuming and costly, especially with so many cloud services being purchased and deployed outside the scope, visibility and control of a centralized IT operations group. See More
Sponsored by IBM - Now is the time to fully embrace SAP modernization. There is simply too much value in the data contained within SAP applications for any enterprise to risk missing out on potential digital transformation opportunities. See More
Sponsored by IBM - Every enterprise has dozens, hundreds, or even thousands of applications developed through traditional methodologies. Whether those applications were created by internal developers or purchased off the shelf from software publishers, it’s highly likely they were built and deployed using tools and processes that have been around for years. See More
Sponsored by IBM - Enterprise IT decision-makers predict that more than 40% of their workloads will be running on public cloud platforms by 2020. The question is not whether to move apps to the public cloud; it is more about which apps to move and how to move them without risk. See More
- November 24, 2015
After acquiring two cloud access security brokers this year, Blue Coat Systems has united CASB capabilities with its Web gateway security technology under a new cloud security strategy.
- November 10, 2015
After acquiring Perspecsys this summer, Blue Coat Systems makes another CASB deal for Elastica to further strengthen its cloud security presence.
- November 06, 2015
Dropbox stepped up its security offerings this week with the introduction of Dropbox Enterprise and several new cloud security controls for business customers.
- October 30, 2015
A critical Xen hypervisor security flaw that allows attackers to access host operating systems and had gone undiscovered for several years was finally patched this week.
- October 28, 2015
Intel Security unexpectedly moved several McAfee SaaS endpoint and email security products to end of life just prior to announcing a new corporate strategy this week.
- October 23, 2015
The negative effects of U.S. government surveillance have put cloud providers in a tough spot and left security vendors scrambling for better privacy protections.
- October 02, 2015
Following its shift to a managed cloud services model, Rackspace has moved into the managed security and compliance services space.
- October 01, 2015
Brian Krebs, Art Coviello and Kris Lovejoy tackle government conflicts and cybersecurity shortcomings at the Privacy. Security. Risk. 2015 event.
- September 30, 2015
Skyhigh Networks' patented method for providing cloud access security broker services uses a reverse proxy mode to provide authentication and policy controls.
- September 25, 2015
Former RSA chairman Art Coviello said the U.S. government and cybersecurity industry need to work together to solve growing issues around cloud security and privacy.