Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Cyber threat protection and intelligence firm FireEye this week launched new cloud-based network security and threat intelligence offerings amid improving finances with its earnings report for the third quarter of 2016. [Read More]
Security analytics and testing firm Rapid7 this week unveiled Project Heisenberg Cloud, a research project designed to use the cloud to get a closer look at what attackers are doing, both in the cloud and across the Internet. [Read More]
Join Armor, Microsoft and SecurityWeek today at 11:30AM to learn how the combination Azure and Armor provides the complete cloud solution: flexibility, scalability, security and compliance. [Read More]
According to an analysis of more than 20,000 cloud services, only 6% can claim to be fully compliant with the European Union's General Data Protection Regulation (GDPR). [Read More]
CloudFlare announces introduction of three new encryption features: TLS 1.3, automatic HTTPS rewrites and opportunistic encryption [Read More]
Oracle has agreed to acquire Cloud Access Security Broker (CASB) firm Palerra for an undisclosed sum. [Read More]
Three privilege escalation flaws and one DoS vulnerability have been patched in the Xen hypervisor [Read More]
Attackers can chain together a couple of vulnerabilities to completely compromise VMware vRA appliances [Read More]
Cybercriminals are using virtual machines (VMs) to hide their nefarious activity on compromised systems. [Read More]
Attend this webinar to learn the 5 key steps to building a hybrid architecture in AWS using the VM-Series next-generation firewall. [Read More]

FEATURES, INSIGHTS // Cloud Security

rss icon

Danelle Au's picture
When it comes to SaaS applications versus on-premise, there are three characteristics that define the need for a different approach to data governance, risk management and security in the cloud.
David Maman's picture
Through simple planning and forethought, organizations can ensure their databases not only meet compliance requirements, but will remain secure.
David Maman's picture
Moving sensitive data into the hands of third-party cloud providers expands and complicates the risk landscape in which companies operate every day.
David Maman's picture
Database Activity Monitoring (DAM) is a crucial part of your compliance and safety profile, but to be effective at protecting your database, you need to understand its limitations.
Danelle Au's picture
Cloud adoption should be a collaborative rather than prescriptive process between employees and IT. With the right mindset and strategy, what employees want and what IT wants can become a proper union in a Venn diagram.
Rebecca Lawson's picture
There is a common misconception that in order to move to virtual security solutions, companies can, or should, replace physical security technologies they rely on to keep their networks safe today.
Danelle Au's picture
The recent iCloud attack brings up very important considerations on data security, not only for consumers, but for any enterprise that uses the cloud.
Danelle Au's picture
Cloud service providers play a key role in delivering security, but as part of the shared responsibility model, they are not liable for access to and usage of the cloud application.
Danelle Au's picture
Enterprises can gain tremendous competitive advantages by having IT focus on the things that matter – users and information rather than infrastructure maintenance and building.
Danelle Au's picture
As the era of Internet of Things dawns, the amount of data and other cloud applications developed for unique industries will increase and bring a new era of privacy and security concerns.