Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Attackers can chain together a couple of vulnerabilities to completely compromise VMware vRA appliances [Read More]
Cybercriminals are using virtual machines (VMs) to hide their nefarious activity on compromised systems. [Read More]
Attend this webinar to learn the 5 key steps to building a hybrid architecture in AWS using the VM-Series next-generation firewall. [Read More]
Xen Project releases patches for two vulnerabilities, including a serious flaw that allows a guest to host escape [Read More]
Attend this webinar to learn the 5 key steps to building a hybrid architecture in AWS using the VM-Series next-generation firewall. [Read More]
Microsoft's Azure Security Center is an holistic platform that can combine the customer's own controls with both Microsoft's own and those of its partners [Read More]
Cisco's move to acquire CloudLock confirms that the security industry considers CASBs to be the way forward in cloud security. [Read More]
Microsoft Azure Information Protection it combines the Azure Rights Management System (RMS) with the data classification and labeling technology acquired with the purchase of Secure Islands in November 2015. [Read More]
VMware has patched a critical information disclosure vulnerability in its NSX and vCNS products [Read More]
Microsoft intends to dominate the corporate cloud, and everything it does is based on that intention. Google, however, seems to have lost its way. [Read More]

FEATURES, INSIGHTS // Cloud Security

rss icon

David Maman's picture
Moving sensitive data into the hands of third-party cloud providers expands and complicates the risk landscape in which companies operate every day.
David Maman's picture
Database Activity Monitoring (DAM) is a crucial part of your compliance and safety profile, but to be effective at protecting your database, you need to understand its limitations.
Danelle Au's picture
Cloud adoption should be a collaborative rather than prescriptive process between employees and IT. With the right mindset and strategy, what employees want and what IT wants can become a proper union in a Venn diagram.
Rebecca Lawson's picture
There is a common misconception that in order to move to virtual security solutions, companies can, or should, replace physical security technologies they rely on to keep their networks safe today.
Danelle Au's picture
The recent iCloud attack brings up very important considerations on data security, not only for consumers, but for any enterprise that uses the cloud.
Danelle Au's picture
Cloud service providers play a key role in delivering security, but as part of the shared responsibility model, they are not liable for access to and usage of the cloud application.
Danelle Au's picture
Enterprises can gain tremendous competitive advantages by having IT focus on the things that matter – users and information rather than infrastructure maintenance and building.
Danelle Au's picture
As the era of Internet of Things dawns, the amount of data and other cloud applications developed for unique industries will increase and bring a new era of privacy and security concerns.
Danelle Au's picture
As SaaS adoption grows, so do the security concerns. But there is so much confusion around SaaS security that many enterprises are focusing on the wrong problems. Here are the three biggest myths when it comes to SaaS security...
Chris Hinkley's picture
Why aren’t more organizations implementing two-factor authentication? In a word: inconvenience. Businesses are afraid of annoying their buyers by demanding multiple passwords or asking them to take an extra action that might spur them into abandoning the sale.