Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Amazon is giving customers the option of an an extra layer of protection to their WorkSpaces virtual desktops by enabling a new two-factor authentication (2FA) feature.
Hypervisors have become an important part of enterprise environments and while they should normally reduce the attack surface, experts warn that they can be plagued by security vulnerabilities that could be leveraged by malicious actors.
The security teams at Drupal and WordPress have fixed a remotely exploitable a denial-of-service (DoS) vulnerability in PHP XML parsing that affects tens of millions of websites that use their publishing platforms.
Qualys, a provider of cloud-based security and compliance solutions, announced enhancements to its cloud service Qualys Continuous Monitoring (CM) solution this week.
Many organizations still haven't patched their installations of VMware to address the Heartbleed vulnerability, CloudPhysics reported.
To protect sensitive data from prying eyes, some organizations are turning to Bring-Your-Own-Encryption (BYOE), but experts warn that there are some aspects that need to be take into consideration before making the move.
Fortinet has introduced a new on-demand, pay-as-you-go offering for its FortiWeb-VM Web Application Firewalls (WAFs) for Amazon Web Services (AWS).
Trend Micro has launched a new solution designed for VMware's vCloud Hybrid Service that enables customers to move their on-premise or private cloud deployment to the public cloud with added layers of protection.
Netskope, a provider of cloud app security and analytics solutions, announced that it has closed a $35 million Series C funding round led by Accel Partners.
OpenDNS announced that it has raised $35 Million in a round funded by existing and new investors.

FEATURES, INSIGHTS // Cloud Security

rss icon

Gil Zimmermann's picture
Understanding why passwords are so valuable to hackers can both explain and prepare enterprises to deal with potential security vulnerabilities. There are potentially hundreds of uses for stolen passwords once they are obtained.
Shaun Donaldson's picture
The smallest Amazon customer benefits from the demands being met for the largest Amazon customers. However, after you get a shiny new instance on Amazon, it’s still up to you to secure the software stack on that instance.
Gil Zimmermann's picture
What companies are realizing is that when it comes to information, people can ultimately decide what to share, who to share it with, and what network, application, or service they will use to do so.
Eric Knapp's picture
There’s been a lot of debate lately over the role the Cloud has within Critical Infrastructure, and whether or not the Cloud is itself a Critical Infrastructure.
Gil Zimmermann's picture
Because free services often flies under the radar, IT and security teams are not actively monitoring for or thinking about these programs and frankly, can have little insight into their existence.
Nimmy Reichenberg's picture
There are numerous financial and operational reasons to make the move to a private, public or hybrid cloud, but you must understand the impact on applications .
Shaun Donaldson's picture
While traditional hosting services have evolved away from bare metal to form IaaS, and generally up the stack to PaaS, including security as part of the service will change as security gets baked-in closer to the infrastructure.
Michael Callahan's picture
The cloud is the only place that can provide the scale and elasticity (without the capital expense) that’s required in a connected world where new devices are appearing by the dozens daily.
Shaun Donaldson's picture
When we consider security in a public cloud, we may be forced to work our way from the endpoint out; and so it’s back-to-basics.
Danelle Au's picture
Many have opined that security is the killer app for SDN… is this true? SDN allows many security use cases to be implemented in a manner that requires fewer configuration changes, and fewer networking headaches.