Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Microsoft Azure customers can now add an extra layer of security to their cloud services and virtual machines (VMs) at no extra cost by using Microsoft Antimalware.
The National Institute of Standards and Technology (NIST) has published a draft of a new guide whose goal is to provide security recommendations on deploying hypervisors.
Zscaler announced the availability of a new version of the its cloud-based Internet security platform, which now provides protection against advanced persistent threats (APT).
BAE Systems plans to acquire SilverSky for $232.5 million.
A new survey from the Cloud Security Alliance found many IT and security pros may be in the dark about the true number of cloud apps used in their organization.
IBM has opened a new cloud resiliency center designed to help organizations protect their services from disruptions.
CloudFlare's Keyless SSL innovation allows customers to take advantage of the company's solutions without ever having to hand over their private SSL keys.
CloudLock has launched a new solution designed to detect, classify and secure sensitive data stored in Google Drive in near real-time.
Salesforce Account administrators have been notified that Salesforce customers are being targeted by key-logging malware known as Dyre.
Security industry experts have analyzed the attack of iCloud user accounts and commented on the impact of the incident on Apple's reputation, and provided recommendations on how to avoid such leaks in the future.

FEATURES, INSIGHTS // Cloud Security

rss icon

Gil Zimmermann's picture
The idea of encrypting data is mistaken for a one-stop solution, and the result is that a tremendous amount of money and time are being spent solving the wrong problem.
Shaun Donaldson's picture
In a business-as-usual situation, making the case for better security is difficult. We all know that pushing security upon organizations is like selling life insurance.
Gil Zimmermann's picture
As 2013 wanes, it makes sense take a few steps back and look at the state of the cloud and how it fits into the plans our customers and friends have been sharing with us. As we move through 2014, will your teams be driving new value, or responding to yesterday’s threats?
Michael Callahan's picture
There are several steps companies can take on the server side to identify and disrupt brute force attacks.
Gil Zimmermann's picture
Understanding why passwords are so valuable to hackers can both explain and prepare enterprises to deal with potential security vulnerabilities. There are potentially hundreds of uses for stolen passwords once they are obtained.
Shaun Donaldson's picture
The smallest Amazon customer benefits from the demands being met for the largest Amazon customers. However, after you get a shiny new instance on Amazon, it’s still up to you to secure the software stack on that instance.
Gil Zimmermann's picture
What companies are realizing is that when it comes to information, people can ultimately decide what to share, who to share it with, and what network, application, or service they will use to do so.
Eric Knapp's picture
There’s been a lot of debate lately over the role the Cloud has within Critical Infrastructure, and whether or not the Cloud is itself a Critical Infrastructure.
Gil Zimmermann's picture
Because free services often flies under the radar, IT and security teams are not actively monitoring for or thinking about these programs and frankly, can have little insight into their existence.
Nimmy Reichenberg's picture
There are numerous financial and operational reasons to make the move to a private, public or hybrid cloud, but you must understand the impact on applications .