Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Google is rolling out a new Accounts sign-in page and of a series of updates to the policies that 3rd-party Single Sign-On (SSO) providers should comply with. [Read More]
VMware has released updates for ESXi, Workstation and Fusion to address 4 vulnerabilities disclosed at Pwn2Own 2017 [Read More]
Cloudflare has found no evidence that the Cloudbleed bug has been exploited for malicious purposes before it was patched [Read More]
Google researcher discovered that CloudFlare had been leaking sensitive customer data, including passwords and encryption keys [Read More]
Cisco launches four new Firepower next-generation firewalls for businesses that perform a high volume of sensitive transactions [Read More]
An increasing number of custom apps are being moved into cloud infrastructures (primarily AWS, Azure and Google Cloud Platform) without the security team necessarily being aware that they exist. [Read More]
Cisco launches Umbrella, a cloud-based secure internet gateway designed to provide visibility and protection outside the corporate network [Read More]
Forcepoint announced that it has agreed to acquire the Skyfence cloud access security broker (CASB) business from Imperva. [Read More]
Palo Alto Networks improves Next-Generation Security Platform with more than 70 new features and launches new firewalls [Read More]
IBM patches two XSS vulnerabilities discovered in its InfoSphere BigInsights analytics platform by a Fortinet researcher [Read More]

FEATURES, INSIGHTS // Cloud Security

rss icon

David Holmes's picture
Will containers replace traditional operating system virtualization in the same way that virtualization has replaced much of the physical, bare-metal world? And how secure are containers, anyway?
Danelle Au's picture
When it comes to SaaS applications versus on-premise, there are three characteristics that define the need for a different approach to data governance, risk management and security in the cloud.
David Maman's picture
Through simple planning and forethought, organizations can ensure their databases not only meet compliance requirements, but will remain secure.
David Maman's picture
Moving sensitive data into the hands of third-party cloud providers expands and complicates the risk landscape in which companies operate every day.
David Maman's picture
Database Activity Monitoring (DAM) is a crucial part of your compliance and safety profile, but to be effective at protecting your database, you need to understand its limitations.
Danelle Au's picture
Cloud adoption should be a collaborative rather than prescriptive process between employees and IT. With the right mindset and strategy, what employees want and what IT wants can become a proper union in a Venn diagram.
Rebecca Lawson's picture
There is a common misconception that in order to move to virtual security solutions, companies can, or should, replace physical security technologies they rely on to keep their networks safe today.
Danelle Au's picture
The recent iCloud attack brings up very important considerations on data security, not only for consumers, but for any enterprise that uses the cloud.
Danelle Au's picture
Cloud service providers play a key role in delivering security, but as part of the shared responsibility model, they are not liable for access to and usage of the cloud application.
Danelle Au's picture
Enterprises can gain tremendous competitive advantages by having IT focus on the things that matter – users and information rather than infrastructure maintenance and building.