Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Dropbox said it has disabled access for previously shared links, and that all shared links going forward have been patched against the issue.
The Cloud Security Alliance (CSA) announced the release of two key documents related to the CSA's Software Defined Perimeter (SDP), an initiative to create the next generation network security architecture.
A new report from Alert Logic shows that cloud environments are increasingly facing some of the same dangers as on-premise environments.
FireHost has $25 million in a Series E funding round led by its longtime investor, The Stephens Group.
Defense.Net is a startup providing DDoS mitigation as a service. SecurityWeek sat down with CTO and Founder Barrett Lyon to discuss the security startup.
Entrust launched a new cloud-based service that consolidates the management of digital identities, SSL certificates and credentials via a single solution platform.
Intel is leading a $900 million financing round with a "significant" investment which will give it an 18 percent stake in Cloudera, the companies said.
Zettaset announced the addition of data-in-motion encryption as a new feature in its flagship management and security add-on application for Hadoop.
Covertix helps customers control and protect sensitive data, while continuing to use their preferred cloud storage. SecurityWeek sat down with CEO Yoran Sirkis to discuss the security startup.
Jim Lewandowski has been named chief executive officer (CEO) of cloud hosting provider FireHost.

FEATURES, INSIGHTS // Cloud Security

rss icon

Danelle Au's picture
As the era of Internet of Things dawns, the amount of data and other cloud applications developed for unique industries will increase and bring a new era of privacy and security concerns.
Danelle Au's picture
As SaaS adoption grows, so do the security concerns. But there is so much confusion around SaaS security that many enterprises are focusing on the wrong problems. Here are the three biggest myths when it comes to SaaS security...
Chris Hinkley's picture
Why aren’t more organizations implementing two-factor authentication? In a word: inconvenience. Businesses are afraid of annoying their buyers by demanding multiple passwords or asking them to take an extra action that might spur them into abandoning the sale.
Marc Solomon's picture
Data center administrators need technologies that allow them to be as ‘centered’ on security as attackers are on the data center.
Torsten George's picture
Shortcomings in a cloud providers’ security architecture can trickle down to customers that leverage their services. So what steps should organizations take to retool their security practices for the cloud age?
Gil Zimmermann's picture
What needs to change is the perception that the primary role of IT is in safeguarding and blocking data from being viewed by an outsider.
Gil Zimmermann's picture
IT managers focused on protecting technology infrastructure would do well to assess whether cloud service providers have better security systems in place than their own corporate IT resources allow.
Aviv Raff's picture
A combination of new threat actors, new attack approaches, and new masking tactics demand that enterprises redefine malware, and make all necessary investments in people, technology and systems to stay one step ahead.
Gil Zimmermann's picture
The idea of encrypting data is mistaken for a one-stop solution, and the result is that a tremendous amount of money and time are being spent solving the wrong problem.
Shaun Donaldson's picture
In a business-as-usual situation, making the case for better security is difficult. We all know that pushing security upon organizations is like selling life insurance.