Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Elastica, a San Jose, Calif.-based provider of cloud application security solutions, today announced that it has closed its series B funding round with an investment of $30 million. [Read More]
Many financial services organizations do not have a concerted cloud strategy with appropriate controls and security, according to a new report from the Cloud Security Alliance. [Read More]
A third of IT pros and administrators admitted downloading apps they were not authorized to and ignoring security policies and best practices in order to do their jobs, according to a new survey. [Read More]
Please join us on Tuesday, Feb. 3rd at 1PM ET for a special webcast: How To Avoid Being Tomorrow's Headline: Mitigating Insider Threats and Breaches, presented by Centrify. [Read More]
A survey from the Cloud Security Alliance found that IT managers and executives still have some trepidation about the security of data in the cloud. [Read More]
Researchers say they have identified several vulnerabilities in Google App Engine for Java, including ones that can be leveraged for a complete sandbox escape. [Read More]
VMware has released software updates to address a series of vulnerabilities affecting the company's popular vSphere virtualization platform. [Read More]
The Google Cloud Platform is now compliant with the Payment Card Industry Data Security Standard (PCI-DSS). [Read More]
According to a study conducted by EMC, enterprises employing more than 250 people lost a total of $1.7 trillion in the past year due to downtime and data loss. [Read More]
Google released two new security tools designed to help Google Apps users protect their accounts. [Read More]

FEATURES, INSIGHTS // Cloud Security

rss icon

Chris Hinkley's picture
Why aren’t more organizations implementing two-factor authentication? In a word: inconvenience. Businesses are afraid of annoying their buyers by demanding multiple passwords or asking them to take an extra action that might spur them into abandoning the sale.
Marc Solomon's picture
Data center administrators need technologies that allow them to be as ‘centered’ on security as attackers are on the data center.
Torsten George's picture
Shortcomings in a cloud providers’ security architecture can trickle down to customers that leverage their services. So what steps should organizations take to retool their security practices for the cloud age?
Gil Zimmermann's picture
What needs to change is the perception that the primary role of IT is in safeguarding and blocking data from being viewed by an outsider.
Gil Zimmermann's picture
IT managers focused on protecting technology infrastructure would do well to assess whether cloud service providers have better security systems in place than their own corporate IT resources allow.
Aviv Raff's picture
A combination of new threat actors, new attack approaches, and new masking tactics demand that enterprises redefine malware, and make all necessary investments in people, technology and systems to stay one step ahead.
Gil Zimmermann's picture
The idea of encrypting data is mistaken for a one-stop solution, and the result is that a tremendous amount of money and time are being spent solving the wrong problem.
Shaun Donaldson's picture
In a business-as-usual situation, making the case for better security is difficult. We all know that pushing security upon organizations is like selling life insurance.
Gil Zimmermann's picture
As 2013 wanes, it makes sense take a few steps back and look at the state of the cloud and how it fits into the plans our customers and friends have been sharing with us. As we move through 2014, will your teams be driving new value, or responding to yesterday’s threats?
Michael Callahan's picture
There are several steps companies can take on the server side to identify and disrupt brute force attacks.