Docker unveiled new security enhancements including hardware signing of container images, content auditing through image scanning and vulnerability detection and granular access control policies with user namespaces. [Read More]
Join SecurityWeek and Zscaler for a compelling webcast full of key insights and findings from an assessment of both integrated security platforms and cloud computing/software-as-a-service (SaaS)-based delivery models. [Read More]
As SaaS adoption grows, so do the security concerns. But there is so much confusion around SaaS security that many enterprises are focusing on the wrong problems. Here are the three biggest myths when it comes to SaaS security...
Why aren’t more organizations implementing two-factor authentication? In a word: inconvenience. Businesses are afraid of annoying their buyers by demanding multiple passwords or asking them to take an extra action that might spur them into abandoning the sale.
Shortcomings in a cloud providers’ security architecture can trickle down to customers that leverage their services. So what steps should organizations take to retool their security practices for the cloud age?
A combination of new threat actors, new attack approaches, and new masking tactics demand that enterprises redefine malware, and make all necessary investments in people, technology and systems to stay one step ahead.