Security Experts:

long dotted


Jim Lewandowski has been named chief executive officer (CEO) of cloud hosting provider FireHost.
Some criminals are taking advantage of poor cloud security practices and configuration mistakes to take over user cloud instances on Amazon Web Services and similar cloud infrastructure platforms.
CloudLock announced the launch of CloudLock Selective Encryption, a new cloud-based encryption solution that enables enterprises to protect data stored across multiple SaaS and public cloud platforms.
A new report by Dell SecureWorks researchers shines the light on the most prevalent banking Trojans of 2013.
Imperva said it would acquire Skyfence and Incapsula, along with mainframe security auditing assets from Tomium in a move that will help extend its data center security strategy across the cloud.
CloudLock, a Waltham, Massachusetts-based firm that helps companies secure data stored in the cloud, has raised $16.5 million in a Series C funding round led by Bessemer Venture Capital.
MongoHQ has added new security features, including the ability for customers to control and see who accesses their account, along with two-factor authentication and security auditing tools.
Incapsula, a cloud-based website performance and security service, announced a new security rules engine designed to help quickly remediate complex application level and business logic attacks.
CipherCloud hopes the acquisition will bolster its ability to enforce data privacy and security controls.
Juniper Networks has unveiled Firefly Suite, a new virtualized security platform designed to protect private and public cloud deployments.

FEATURES, INSIGHTS // Cloud Security

rss icon

Gil Zimmermann's picture
What needs to change is the perception that the primary role of IT is in safeguarding and blocking data from being viewed by an outsider.
Gil Zimmermann's picture
IT managers focused on protecting technology infrastructure would do well to assess whether cloud service providers have better security systems in place than their own corporate IT resources allow.
Aviv Raff's picture
A combination of new threat actors, new attack approaches, and new masking tactics demand that enterprises redefine malware, and make all necessary investments in people, technology and systems to stay one step ahead.
Gil Zimmermann's picture
The idea of encrypting data is mistaken for a one-stop solution, and the result is that a tremendous amount of money and time are being spent solving the wrong problem.
Shaun Donaldson's picture
In a business-as-usual situation, making the case for better security is difficult. We all know that pushing security upon organizations is like selling life insurance.
Gil Zimmermann's picture
As 2013 wanes, it makes sense take a few steps back and look at the state of the cloud and how it fits into the plans our customers and friends have been sharing with us. As we move through 2014, will your teams be driving new value, or responding to yesterday’s threats?
Michael Callahan's picture
There are several steps companies can take on the server side to identify and disrupt brute force attacks.
Gil Zimmermann's picture
Understanding why passwords are so valuable to hackers can both explain and prepare enterprises to deal with potential security vulnerabilities. There are potentially hundreds of uses for stolen passwords once they are obtained.
Shaun Donaldson's picture
The smallest Amazon customer benefits from the demands being met for the largest Amazon customers. However, after you get a shiny new instance on Amazon, it’s still up to you to secure the software stack on that instance.
Gil Zimmermann's picture
What companies are realizing is that when it comes to information, people can ultimately decide what to share, who to share it with, and what network, application, or service they will use to do so.