Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Microsoft announces Windows bug bounty program with payouts ranging between $500 and $250,000 [Read More]
Hundreds of organizations may be exposing sensitive information via misconfigured Google Groups [Read More]
Dow Jones has exposed the details of millions of customers via a misconfigured AWS S3 bucket [Read More]
Human error led to the personal details of millions of Verizon customers being exposed online, but the telecoms giant has downplayed the incident [Read More]
Cloud security firm HyTrust acquires data visibility company DataGravity and raises $36 million in a funding round led by AVP [Read More]
Microsoft fixes important privilege escalation vulnerability in Azure Active Directory (AD) Connect [Read More]
Elastic Beam emerges from stealth mode with AI-powered API security solution [Read More]
San Jose, CA-based cloud security start-up ShieldX Networks has emerged from stealth with a new product to secure cloud infrastructure. [Read More]
Arbor Networks used IP addresses provided by US-CERT to analyze North Korea’s Hidden Cobra DDoS attacks [Read More]
IBM Security announces new cloud identity service that will become available in the IBM Cloud Marketplace later this week [Read More]

FEATURES, INSIGHTS // Cloud Security

rss icon

David Holmes's picture
Will containers replace traditional operating system virtualization in the same way that virtualization has replaced much of the physical, bare-metal world? And how secure are containers, anyway?
Danelle Au's picture
When it comes to SaaS applications versus on-premise, there are three characteristics that define the need for a different approach to data governance, risk management and security in the cloud.
David Maman's picture
Through simple planning and forethought, organizations can ensure their databases not only meet compliance requirements, but will remain secure.
David Maman's picture
Moving sensitive data into the hands of third-party cloud providers expands and complicates the risk landscape in which companies operate every day.
David Maman's picture
Database Activity Monitoring (DAM) is a crucial part of your compliance and safety profile, but to be effective at protecting your database, you need to understand its limitations.
Danelle Au's picture
Cloud adoption should be a collaborative rather than prescriptive process between employees and IT. With the right mindset and strategy, what employees want and what IT wants can become a proper union in a Venn diagram.
Rebecca Lawson's picture
There is a common misconception that in order to move to virtual security solutions, companies can, or should, replace physical security technologies they rely on to keep their networks safe today.
Danelle Au's picture
The recent iCloud attack brings up very important considerations on data security, not only for consumers, but for any enterprise that uses the cloud.
Danelle Au's picture
Cloud service providers play a key role in delivering security, but as part of the shared responsibility model, they are not liable for access to and usage of the cloud application.
Danelle Au's picture
Enterprises can gain tremendous competitive advantages by having IT focus on the things that matter – users and information rather than infrastructure maintenance and building.