Security Experts:

long dotted


A new report from Alert Logic shows that cloud environments are increasingly facing some of the same dangers as on-premise environments.
FireHost has $25 million in a Series E funding round led by its longtime investor, The Stephens Group.
Defense.Net is a startup providing DDoS mitigation as a service. SecurityWeek sat down with CTO and Founder Barrett Lyon to discuss the security startup.
Entrust launched a new cloud-based service that consolidates the management of digital identities, SSL certificates and credentials via a single solution platform.
Intel is leading a $900 million financing round with a "significant" investment which will give it an 18 percent stake in Cloudera, the companies said.
Zettaset announced the addition of data-in-motion encryption as a new feature in its flagship management and security add-on application for Hadoop.
Covertix helps customers control and protect sensitive data, while continuing to use their preferred cloud storage. SecurityWeek sat down with CEO Yoran Sirkis to discuss the security startup.
Jim Lewandowski has been named chief executive officer (CEO) of cloud hosting provider FireHost.
Some criminals are taking advantage of poor cloud security practices and configuration mistakes to take over user cloud instances on Amazon Web Services and similar cloud infrastructure platforms.
CloudLock announced the launch of CloudLock Selective Encryption, a new cloud-based encryption solution that enables enterprises to protect data stored across multiple SaaS and public cloud platforms.

FEATURES, INSIGHTS // Cloud Security

rss icon

Eric Knapp's picture
There’s been a lot of debate lately over the role the Cloud has within Critical Infrastructure, and whether or not the Cloud is itself a Critical Infrastructure.
Gil Zimmermann's picture
Because free services often flies under the radar, IT and security teams are not actively monitoring for or thinking about these programs and frankly, can have little insight into their existence.
Nimmy Reichenberg's picture
There are numerous financial and operational reasons to make the move to a private, public or hybrid cloud, but you must understand the impact on applications .
Shaun Donaldson's picture
While traditional hosting services have evolved away from bare metal to form IaaS, and generally up the stack to PaaS, including security as part of the service will change as security gets baked-in closer to the infrastructure.
Michael Callahan's picture
The cloud is the only place that can provide the scale and elasticity (without the capital expense) that’s required in a connected world where new devices are appearing by the dozens daily.
Shaun Donaldson's picture
When we consider security in a public cloud, we may be forced to work our way from the endpoint out; and so it’s back-to-basics.
Danelle Au's picture
Many have opined that security is the killer app for SDN… is this true? SDN allows many security use cases to be implemented in a manner that requires fewer configuration changes, and fewer networking headaches.
Shaun Donaldson's picture
It is no secret that small-to-medium sized businesses (SMBs) have very different ways of using IT when compared with large enterprises. And contrary to popular belief, there are some areas where SMBs are leading, not following.
Shaun Donaldson's picture
In IT, security has consistently been a bolt-on afterthought, and we have only ourselves and everyone else to blame. Given the pace of virtualization, cloud, and other profound paradigm shifts that are providing rich opportunities, security and IT can reunite.
Danelle Au's picture
How does network virtualization differ from software defined networking (SDN) and network functions virtualization? And, more importantly, how does it impact network security?