Security Experts:

long dotted


Amazon announces availability of AWS WAF, a web application firewall that helps protect apps against common exploits.
Join SecurityWeek and Zscaler for a compelling webcast full of key insights and findings from an assessment of both integrated security platforms and cloud computing/software-as-a-service (SaaS)-based delivery models.
According to a recent survey of 272 IT decision makers in North America, 91 percent of respondents said they were concerned about the security of containers.
Microsoft has acquired Adallom, an Israeli security startup that helps organizations protect data in cloud applications.
FireHost, the Dallas-based cloud-hosting provider that has made security the focus of its business, announced on Monday that is has as Armor.
1% of employees are responsible for 75% of cloud security risk in an organization, according to CloudLock
As more organizations become more comfortable with putting data in the cloud, they are aggressively applying varying levels of data protection to different types of information, according to a recent survey.
While container adoption is likely to surge over the next few years, concerns around security, certification and adequate skills remain, according to a recent survey commissioned by Red Hat.
US technology companies are getting hit harder than anticipated by revelations about surveillance programs led by the National Security Agency, a study showed Tuesday.
By deploying Adallom with Dropbox for Business, customers will gain visibility into and control over company data shared and stored within Dropbox.

FEATURES, INSIGHTS // Cloud Security

rss icon

Marc Solomon's picture
To ensure you understand and can address the main security challenges cloud apps can introduce to your organization, you need additional visibility and context.
Marc Solomon's picture
How do we handle the responsibility that cloud computing brings? It’s a responsibility that must be shared among vendors, users, business leaders, and IT security professionals and involves three key aspects.
Alan Cohen's picture
Like other forms of technical debt, security debt must be paid down, which ultimately leads to a more agile and secure enterprise.
Danelle Au's picture
If your organization is not equipped to deal with the security of Emergent IT, it is probably not equipped to deal with the security of mainstream applications sanctioned by IT.
Joshua Goldfarb's picture
When moving to the cloud, companies must understand the implications, enumerate the risks, and mitigate those risks accordingly.
Alan Cohen's picture
Today’s network perimeter is increasingly not a single physical or virtual place, yet much of the industry debate is still focused on the perimeter.
David Holmes's picture
Will containers replace traditional operating system virtualization in the same way that virtualization has replaced much of the physical, bare-metal world? And how secure are containers, anyway?
Danelle Au's picture
When it comes to SaaS applications versus on-premise, there are three characteristics that define the need for a different approach to data governance, risk management and security in the cloud.
David Maman's picture
Through simple planning and forethought, organizations can ensure their databases not only meet compliance requirements, but will remain secure.
David Maman's picture
Moving sensitive data into the hands of third-party cloud providers expands and complicates the risk landscape in which companies operate every day.