Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Trend Micro announced the availability of its cloud and data center platform, Deep Security, for Amazon Web Services (AWS) on AWS Marketplace.
Adallom has released a report which analyzes the security gaps and risks associated with the usage of cloud applications.
Microsoft Azure customers can now add an extra layer of security to their cloud services and virtual machines (VMs) at no extra cost by using Microsoft Antimalware.
The National Institute of Standards and Technology (NIST) has published a draft of a new guide whose goal is to provide security recommendations on deploying hypervisors.
Zscaler announced the availability of a new version of the its cloud-based Internet security platform, which now provides protection against advanced persistent threats (APT).
BAE Systems plans to acquire SilverSky for $232.5 million.
A new survey from the Cloud Security Alliance found many IT and security pros may be in the dark about the true number of cloud apps used in their organization.
IBM has opened a new cloud resiliency center designed to help organizations protect their services from disruptions.
CloudFlare's Keyless SSL innovation allows customers to take advantage of the company's solutions without ever having to hand over their private SSL keys.
CloudLock has launched a new solution designed to detect, classify and secure sensitive data stored in Google Drive in near real-time.

FEATURES, INSIGHTS // Cloud Security

rss icon

David Maman's picture
Moving sensitive data into the hands of third-party cloud providers expands and complicates the risk landscape in which companies operate every day.
David Maman's picture
Database Activity Monitoring (DAM) is a crucial part of your compliance and safety profile, but to be effective at protecting your database, you need to understand its limitations.
Danelle Au's picture
Cloud adoption should be a collaborative rather than prescriptive process between employees and IT. With the right mindset and strategy, what employees want and what IT wants can become a proper union in a Venn diagram.
Rebecca Lawson's picture
There is a common misconception that in order to move to virtual security solutions, companies can, or should, replace physical security technologies they rely on to keep their networks safe today.
Danelle Au's picture
The recent iCloud attack brings up very important considerations on data security, not only for consumers, but for any enterprise that uses the cloud.
Danelle Au's picture
Cloud service providers play a key role in delivering security, but as part of the shared responsibility model, they are not liable for access to and usage of the cloud application.
Danelle Au's picture
Enterprises can gain tremendous competitive advantages by having IT focus on the things that matter – users and information rather than infrastructure maintenance and building.
Danelle Au's picture
As the era of Internet of Things dawns, the amount of data and other cloud applications developed for unique industries will increase and bring a new era of privacy and security concerns.
Danelle Au's picture
As SaaS adoption grows, so do the security concerns. But there is so much confusion around SaaS security that many enterprises are focusing on the wrong problems. Here are the three biggest myths when it comes to SaaS security...
Chris Hinkley's picture
Why aren’t more organizations implementing two-factor authentication? In a word: inconvenience. Businesses are afraid of annoying their buyers by demanding multiple passwords or asking them to take an extra action that might spur them into abandoning the sale.
view counter