Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

VMware has patched a critical information disclosure vulnerability in its NSX and vCNS products [Read More]
Microsoft intends to dominate the corporate cloud, and everything it does is based on that intention. Google, however, seems to have lost its way. [Read More]
Analysis of more than 600 enterprise users of Office 365 products found that users are continuing to store sensitive data unencrypted in the Microsoft cloud. [Read More]
Bug bounty hunter earns $5,000 for a stored XSS vulnerability in Google’s Cloud Platform Console [Read More]
Congress is tightening security by controlling its users' access to certain cloud services, including blocking Yahoo Mail and Google apps. [Read More]
Microsoft believes in a fundamental split in security responsibility. The cloud provider is responsible for the physical aspects of the cloud IT infrastructure and the software that it provides. The customer is responsible for its own data. [Read More]
Visibility is the main reasoning behind Microsoft's newly available Cloud App Security. It is a CASB, developed from the acquisition of Adallom, and it does what other CASBs do. Microsoft describes this as three primary capabilities: [Read More]
Security risks (44%) followed by compliance and regulation (29%) are the two biggest factors preventing greater cloud adoption. [Read More]
VMware has released updates for the Linux versions of vRealize Automation and vRealize Business to patch XSS vulnerabilities [Read More]
Qualys ThreatPROTECT gathers and correlates data from vulnerability scans and threat feeds to give organizations a view of their potential exposure to threats. [Read More]

FEATURES, INSIGHTS // Cloud Security

rss icon

Rebecca Lawson's picture
There is a common misconception that in order to move to virtual security solutions, companies can, or should, replace physical security technologies they rely on to keep their networks safe today.
Danelle Au's picture
The recent iCloud attack brings up very important considerations on data security, not only for consumers, but for any enterprise that uses the cloud.
Danelle Au's picture
Cloud service providers play a key role in delivering security, but as part of the shared responsibility model, they are not liable for access to and usage of the cloud application.
Danelle Au's picture
Enterprises can gain tremendous competitive advantages by having IT focus on the things that matter – users and information rather than infrastructure maintenance and building.
Danelle Au's picture
As the era of Internet of Things dawns, the amount of data and other cloud applications developed for unique industries will increase and bring a new era of privacy and security concerns.
Danelle Au's picture
As SaaS adoption grows, so do the security concerns. But there is so much confusion around SaaS security that many enterprises are focusing on the wrong problems. Here are the three biggest myths when it comes to SaaS security...
Chris Hinkley's picture
Why aren’t more organizations implementing two-factor authentication? In a word: inconvenience. Businesses are afraid of annoying their buyers by demanding multiple passwords or asking them to take an extra action that might spur them into abandoning the sale.
Marc Solomon's picture
Data center administrators need technologies that allow them to be as ‘centered’ on security as attackers are on the data center.
Torsten George's picture
Shortcomings in a cloud providers’ security architecture can trickle down to customers that leverage their services. So what steps should organizations take to retool their security practices for the cloud age?
Gil Zimmermann's picture
What needs to change is the perception that the primary role of IT is in safeguarding and blocking data from being viewed by an outsider.