Security Experts:

long dotted


CloudLock, a Waltham, Massachusetts-based firm that helps companies secure data stored in the cloud, has raised $16.5 million in a Series C funding round led by Bessemer Venture Capital.
MongoHQ has added new security features, including the ability for customers to control and see who accesses their account, along with two-factor authentication and security auditing tools.
Incapsula, a cloud-based website performance and security service, announced a new security rules engine designed to help quickly remediate complex application level and business logic attacks.
CipherCloud hopes the acquisition will bolster its ability to enforce data privacy and security controls.
Juniper Networks has unveiled Firefly Suite, a new virtualized security platform designed to protect private and public cloud deployments.
More than 30,000 people have signed an online petition calling on The Washington Post to tell readers that Amazon, founded by its owner Jeff Bezos, does business with the CIA.
Keeping to tradition, SecurityWeek invited security experts to weigh in on New Year's resolutions for improving information security and how organizations can better develop new habits in 2014.
Under fire from courts and allies over a vast US spying dragnet, President Barack Obama faced new heat from Internet executives who fear the surveillance has crossed constitutional lines.
Security experts discuss the importance of threat modeling in cloud environments.
Splunk, a provider of software that helps organizations gather and make use of machine data from a diverse set of sources, today announced it has acquired Cloudmeter, a provider of network data capture technologies.

FEATURES, INSIGHTS // Cloud Security

rss icon

Shaun Donaldson's picture
While traditional hosting services have evolved away from bare metal to form IaaS, and generally up the stack to PaaS, including security as part of the service will change as security gets baked-in closer to the infrastructure.
Michael Callahan's picture
The cloud is the only place that can provide the scale and elasticity (without the capital expense) that’s required in a connected world where new devices are appearing by the dozens daily.
Shaun Donaldson's picture
When we consider security in a public cloud, we may be forced to work our way from the endpoint out; and so it’s back-to-basics.
Danelle Au's picture
Many have opined that security is the killer app for SDN… is this true? SDN allows many security use cases to be implemented in a manner that requires fewer configuration changes, and fewer networking headaches.
Shaun Donaldson's picture
It is no secret that small-to-medium sized businesses (SMBs) have very different ways of using IT when compared with large enterprises. And contrary to popular belief, there are some areas where SMBs are leading, not following.
Shaun Donaldson's picture
In IT, security has consistently been a bolt-on afterthought, and we have only ourselves and everyone else to blame. Given the pace of virtualization, cloud, and other profound paradigm shifts that are providing rich opportunities, security and IT can reunite.
Danelle Au's picture
How does network virtualization differ from software defined networking (SDN) and network functions virtualization? And, more importantly, how does it impact network security?
Nimmy Reichenberg's picture
By including security into the DevOps model, organizations can attain that improved agility and operational excellence while also improving the necessary checks and balances before changes are pushed into production.
Jon-Louis Heimerl's picture
If your organization was breached by malicious attackers and you had just enough time to completely protect exactly one data asset (drive, server, application, database, etc.), what data do you save?
Marc Solomon's picture
The time is right to take a closer look at securing virtual environments as part of your extended network and overarching security strategy.