Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Trend Micro announced the availability of its cloud and data center platform, Deep Security, for Amazon Web Services (AWS) on AWS Marketplace.
Adallom has released a report which analyzes the security gaps and risks associated with the usage of cloud applications.
Microsoft Azure customers can now add an extra layer of security to their cloud services and virtual machines (VMs) at no extra cost by using Microsoft Antimalware.
The National Institute of Standards and Technology (NIST) has published a draft of a new guide whose goal is to provide security recommendations on deploying hypervisors.
Zscaler announced the availability of a new version of the its cloud-based Internet security platform, which now provides protection against advanced persistent threats (APT).
BAE Systems plans to acquire SilverSky for $232.5 million.
A new survey from the Cloud Security Alliance found many IT and security pros may be in the dark about the true number of cloud apps used in their organization.
IBM has opened a new cloud resiliency center designed to help organizations protect their services from disruptions.
CloudFlare's Keyless SSL innovation allows customers to take advantage of the company's solutions without ever having to hand over their private SSL keys.
CloudLock has launched a new solution designed to detect, classify and secure sensitive data stored in Google Drive in near real-time.

FEATURES, INSIGHTS // Cloud Security

rss icon

Gil Zimmermann's picture
What needs to change is the perception that the primary role of IT is in safeguarding and blocking data from being viewed by an outsider.
Gil Zimmermann's picture
IT managers focused on protecting technology infrastructure would do well to assess whether cloud service providers have better security systems in place than their own corporate IT resources allow.
Aviv Raff's picture
A combination of new threat actors, new attack approaches, and new masking tactics demand that enterprises redefine malware, and make all necessary investments in people, technology and systems to stay one step ahead.
Gil Zimmermann's picture
The idea of encrypting data is mistaken for a one-stop solution, and the result is that a tremendous amount of money and time are being spent solving the wrong problem.
Shaun Donaldson's picture
In a business-as-usual situation, making the case for better security is difficult. We all know that pushing security upon organizations is like selling life insurance.
Gil Zimmermann's picture
As 2013 wanes, it makes sense take a few steps back and look at the state of the cloud and how it fits into the plans our customers and friends have been sharing with us. As we move through 2014, will your teams be driving new value, or responding to yesterday’s threats?
Michael Callahan's picture
There are several steps companies can take on the server side to identify and disrupt brute force attacks.
Gil Zimmermann's picture
Understanding why passwords are so valuable to hackers can both explain and prepare enterprises to deal with potential security vulnerabilities. There are potentially hundreds of uses for stolen passwords once they are obtained.
Shaun Donaldson's picture
The smallest Amazon customer benefits from the demands being met for the largest Amazon customers. However, after you get a shiny new instance on Amazon, it’s still up to you to secure the software stack on that instance.
Gil Zimmermann's picture
What companies are realizing is that when it comes to information, people can ultimately decide what to share, who to share it with, and what network, application, or service they will use to do so.