Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

VMware has released updates for the Linux versions of vRealize Automation and vRealize Business to patch XSS vulnerabilities [Read More]
Qualys ThreatPROTECT gathers and correlates data from vulnerability scans and threat feeds to give organizations a view of their potential exposure to threats. [Read More]
Darktrace has extended its self-learning threat detection technology to virtualized environments. [Read More]
Broadly shared files represent a high security risk for organizations, as 1 in 10 contain sensitive corporate data, Blue Coat’s Shadow Data Report for the second half of 2015 reveals. [Read More]
Unisys Corporation has made its Unisys Stealth micro-segmentation security solution available for Amazon Web Services (AWS) Cloud customers. [Read More]
Cisco this week announced Cloud Consumption as a Service, a new software-as-a-service product aimed at helping businesses address the increasing shadow IT challenge. [Read More]
A preview version of Microsoft's Azure Container Service (ACS) is now available, providing customers with the ability to manage multiple virtual machines acting as container hosts. [Read More]
Docker unveiled new security enhancements including hardware signing of container images, content auditing through image scanning and vulnerability detection and granular access control policies with user namespaces. [Read More]
San Diego-based based iboss Cybersecurity announced on Tuesday that it has raised $35 million in a Series A funding round from investment giant Goldman Sachs. [Read More]
Hackers breached the systems of anti-adblocking service PageFair and used the access to deliver malware [Read More]

FEATURES, INSIGHTS // Cloud Security

rss icon

Danelle Au's picture
Cloud service providers play a key role in delivering security, but as part of the shared responsibility model, they are not liable for access to and usage of the cloud application.
Danelle Au's picture
Enterprises can gain tremendous competitive advantages by having IT focus on the things that matter – users and information rather than infrastructure maintenance and building.
Danelle Au's picture
As the era of Internet of Things dawns, the amount of data and other cloud applications developed for unique industries will increase and bring a new era of privacy and security concerns.
Danelle Au's picture
As SaaS adoption grows, so do the security concerns. But there is so much confusion around SaaS security that many enterprises are focusing on the wrong problems. Here are the three biggest myths when it comes to SaaS security...
Chris Hinkley's picture
Why aren’t more organizations implementing two-factor authentication? In a word: inconvenience. Businesses are afraid of annoying their buyers by demanding multiple passwords or asking them to take an extra action that might spur them into abandoning the sale.
Marc Solomon's picture
Data center administrators need technologies that allow them to be as ‘centered’ on security as attackers are on the data center.
Torsten George's picture
Shortcomings in a cloud providers’ security architecture can trickle down to customers that leverage their services. So what steps should organizations take to retool their security practices for the cloud age?
Gil Zimmermann's picture
What needs to change is the perception that the primary role of IT is in safeguarding and blocking data from being viewed by an outsider.
Gil Zimmermann's picture
IT managers focused on protecting technology infrastructure would do well to assess whether cloud service providers have better security systems in place than their own corporate IT resources allow.
Aviv Raff's picture
A combination of new threat actors, new attack approaches, and new masking tactics demand that enterprises redefine malware, and make all necessary investments in people, technology and systems to stay one step ahead.