Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

VMware has released updates for ESXi, Workstation and Fusion to address 4 vulnerabilities disclosed at Pwn2Own 2017 [Read More]
Cloudflare has found no evidence that the Cloudbleed bug has been exploited for malicious purposes before it was patched [Read More]
Google researcher discovered that CloudFlare had been leaking sensitive customer data, including passwords and encryption keys [Read More]
Cisco launches four new Firepower next-generation firewalls for businesses that perform a high volume of sensitive transactions [Read More]
An increasing number of custom apps are being moved into cloud infrastructures (primarily AWS, Azure and Google Cloud Platform) without the security team necessarily being aware that they exist. [Read More]
Cisco launches Umbrella, a cloud-based secure internet gateway designed to provide visibility and protection outside the corporate network [Read More]
Forcepoint announced that it has agreed to acquire the Skyfence cloud access security broker (CASB) business from Imperva. [Read More]
Palo Alto Networks improves Next-Generation Security Platform with more than 70 new features and launches new firewalls [Read More]
IBM patches two XSS vulnerabilities discovered in its InfoSphere BigInsights analytics platform by a Fortinet researcher [Read More]
Western Digital patches remote command execution and authentication bypass vulnerabilities in My Cloud storage products [Read More]

FEATURES, INSIGHTS // Cloud Security

rss icon

Jennifer Blatnik's picture
While using containers to secure your organization is a relatively novel approach, it can lead to cost savings and massive scalability.
David Holmes's picture
How do you secure application components when they’re shifting from cloud to cloud? Any traffic traversing from one public cloud to another is by definition crossing the Internet and should therefore not be trusted.
Alan Cohen's picture
Traditional incident management approaches that rely on network monitoring and detection of attacks are also falling short in today’s agile and distributed computing world.
Alan Cohen's picture
Now that we are coming up on the second “year of the hack”—who said good things only come around once, right?
Marc Solomon's picture
To ensure you understand and can address the main security challenges cloud apps can introduce to your organization, you need additional visibility and context.
Marc Solomon's picture
How do we handle the responsibility that cloud computing brings? It’s a responsibility that must be shared among vendors, users, business leaders, and IT security professionals and involves three key aspects.
Alan Cohen's picture
Like other forms of technical debt, security debt must be paid down, which ultimately leads to a more agile and secure enterprise.
Danelle Au's picture
If your organization is not equipped to deal with the security of Emergent IT, it is probably not equipped to deal with the security of mainstream applications sanctioned by IT.
Joshua Goldfarb's picture
When moving to the cloud, companies must understand the implications, enumerate the risks, and mitigate those risks accordingly.
Alan Cohen's picture
Today’s network perimeter is increasingly not a single physical or virtual place, yet much of the industry debate is still focused on the perimeter.