Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Aqua Security, a Tel Aviv, Israel-based container security startup, has raised $25 million in Series B funding, bringing the total amount raised by the company to $38.5 million. [Read More]
DigitalOcean warns users that 1-Click applications running MySQL share a default password. Other cloud providers also affected [Read More]
VMware patches critical SVGA code execution flaw and other vulnerabilities in ESXi, vCenter Server, Workstation and Fusion [Read More]
Mocana this week announced that it has verified the integration of its IoT Security Platform with the IoT cloud platforms of Amazon Web Services, Microsoft Azure IoT, and VMware. [Read More]
Cloud-based online storage service Autodesk A360 Drive has been recently abused as a malware delivery platform, according to Trend Micro. [Read More]
Details of thousands of U.S. military veterans and law enforcement officers looking for a job at an international security firm leaked online via unprotected AWS storage [Read More]
Google introduces the beta version of the App Engine firewall, a new security feature for its cloud platform [Read More]
Cisco adds end-to-end encryption, mobile device security for non-managed devices, and other capabilities to Spark collaboration platform [Read More]
Amazon launches Macie, a new service that helps AWS users discover, classify and protect sensitive data [Read More]
Public cloud environments are the most secure, according to data collected over an 18-month period by Alert Logic [Read More]

FEATURES, INSIGHTS // Cloud Security

rss icon

Alan Cohen's picture
Today’s network perimeter is increasingly not a single physical or virtual place, yet much of the industry debate is still focused on the perimeter.
David Holmes's picture
Will containers replace traditional operating system virtualization in the same way that virtualization has replaced much of the physical, bare-metal world? And how secure are containers, anyway?
Danelle Au's picture
When it comes to SaaS applications versus on-premise, there are three characteristics that define the need for a different approach to data governance, risk management and security in the cloud.
David Maman's picture
Through simple planning and forethought, organizations can ensure their databases not only meet compliance requirements, but will remain secure.
David Maman's picture
Moving sensitive data into the hands of third-party cloud providers expands and complicates the risk landscape in which companies operate every day.
David Maman's picture
Database Activity Monitoring (DAM) is a crucial part of your compliance and safety profile, but to be effective at protecting your database, you need to understand its limitations.
Danelle Au's picture
Cloud adoption should be a collaborative rather than prescriptive process between employees and IT. With the right mindset and strategy, what employees want and what IT wants can become a proper union in a Venn diagram.
Rebecca Lawson's picture
There is a common misconception that in order to move to virtual security solutions, companies can, or should, replace physical security technologies they rely on to keep their networks safe today.
Danelle Au's picture
The recent iCloud attack brings up very important considerations on data security, not only for consumers, but for any enterprise that uses the cloud.
Danelle Au's picture
Cloud service providers play a key role in delivering security, but as part of the shared responsibility model, they are not liable for access to and usage of the cloud application.