Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A team of researchers claims the origin IPs of more than 70% of websites protected by cloud security providers are exposed. [Read More]
Amazon announces availability of AWS WAF, a web application firewall that helps protect apps against common exploits. [Read More]
Join SecurityWeek and Zscaler for a compelling webcast full of key insights and findings from an assessment of both integrated security platforms and cloud computing/software-as-a-service (SaaS)-based delivery models. [Read More]
According to a recent survey of 272 IT decision makers in North America, 91 percent of respondents said they were concerned about the security of containers. [Read More]
Microsoft has acquired Adallom, an Israeli security startup that helps organizations protect data in cloud applications. [Read More]
FireHost, the Dallas-based cloud-hosting provider that has made security the focus of its business, announced on Monday that is has as Armor. [Read More]
1% of employees are responsible for 75% of cloud security risk in an organization, according to CloudLock [Read More]
As more organizations become more comfortable with putting data in the cloud, they are aggressively applying varying levels of data protection to different types of information, according to a recent survey. [Read More]
While container adoption is likely to surge over the next few years, concerns around security, certification and adequate skills remain, according to a recent survey commissioned by Red Hat. [Read More]
US technology companies are getting hit harder than anticipated by revelations about surveillance programs led by the National Security Agency, a study showed Tuesday. [Read More]

FEATURES, INSIGHTS // Cloud Security

rss icon

Danelle Au's picture
As SaaS adoption grows, so do the security concerns. But there is so much confusion around SaaS security that many enterprises are focusing on the wrong problems. Here are the three biggest myths when it comes to SaaS security...
Chris Hinkley's picture
Why aren’t more organizations implementing two-factor authentication? In a word: inconvenience. Businesses are afraid of annoying their buyers by demanding multiple passwords or asking them to take an extra action that might spur them into abandoning the sale.
Marc Solomon's picture
Data center administrators need technologies that allow them to be as ‘centered’ on security as attackers are on the data center.
Torsten George's picture
Shortcomings in a cloud providers’ security architecture can trickle down to customers that leverage their services. So what steps should organizations take to retool their security practices for the cloud age?
Gil Zimmermann's picture
What needs to change is the perception that the primary role of IT is in safeguarding and blocking data from being viewed by an outsider.
Gil Zimmermann's picture
IT managers focused on protecting technology infrastructure would do well to assess whether cloud service providers have better security systems in place than their own corporate IT resources allow.
Aviv Raff's picture
A combination of new threat actors, new attack approaches, and new masking tactics demand that enterprises redefine malware, and make all necessary investments in people, technology and systems to stay one step ahead.
Gil Zimmermann's picture
The idea of encrypting data is mistaken for a one-stop solution, and the result is that a tremendous amount of money and time are being spent solving the wrong problem.
Shaun Donaldson's picture
In a business-as-usual situation, making the case for better security is difficult. We all know that pushing security upon organizations is like selling life insurance.
Gil Zimmermann's picture
As 2013 wanes, it makes sense take a few steps back and look at the state of the cloud and how it fits into the plans our customers and friends have been sharing with us. As we move through 2014, will your teams be driving new value, or responding to yesterday’s threats?