Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

SaaS machine data analytics platform provider Sumo Logic this week announced the acquisition of cloud-native autonomous security operations center (ASOC) software provider JASK Labs. [Read More]
At its Ignite 2019 conference, Microsoft announced a series of tools to expand the security capabilities of its Azure and Microsoft 365 platforms. [Read More]
Cloud networking and security services provider Aviatrix raises $40 million in a Series C funding round, which brings the total raised by the company to over $76 million. [Read More]
The Pentagon is awarding a $10 billion cloud computing contract to Microsoft, following a highly scrutinized bidding process which Amazon had been favored to win. [Read More]
A group of security researchers from German universities has devised a new class of web cache poisoning attacks that could render victim services unreachable. [Read More]
AWS customers experience service interruptions caused by a DDoS attack aimed at DNS servers. [Read More]
Microsoft this week announced the public preview of a new feature that allows enterprise users to check their Azure Active Directory sign-ins for any unusual activity. [Read More]
Trend Micro acquires cloud security firm Cloud Conformity for $70 million to expand cloud security capabilities. [Read More]
With increasing use and familiarity with the cloud and its opportunities, the threat of Shadow IT is growing and needs to be tackled, but without destroying the benefit. [Read More]
VMware releases patches to address a critical Harbor vulnerability, which was found to impact VMware Cloud Foundation and VMware Harbor Container Registry for PCF. [Read More]

FEATURES, INSIGHTS // Cloud Security

rss icon

Preston Hogue's picture
This move to container-based development and agile methodologies has been great for innovation and iteration, but it’s also brought a massive shift in the application landscape with real impact on security teams.
Ashley Arbuckle's picture
Whatever form your move to the cloud takes, you need the right technologies and talent in place to ensure a secure transition.
Laurence Pitt's picture
The biggest truth about security in public cloud is that it provides security at scale. As a single organization, everything you do is at a scale of one.
John Maddison's picture
Analysis of a vendor’s underlying design and optimization approaches will enable you to select the solution that best meets your organization’s performance and budgetary requirements.
Ashley Arbuckle's picture
What can you do to mitigate the risk you may be inadvertently introducing to your public cloud deployments?
Scott Simkin's picture
Clunky security approaches, pieced together from multiple vendors, result in a fragmented security environment where IT teams must manually correlate data to implement actionable security protections.
Ashley Arbuckle's picture
While it’s easy to deploy new IT services, many of the security tools and processes that we’ve used in our networks and data centers will not work in public clouds.
Travis Greene's picture
Maintaining consistent security controls across the entire hybrid IT environment is growing increasingly complex as more cloud services are adopted.
Scott Simkin's picture
While it's not possible to put a physical firewall in the cloud, security professionals must apply the same rigor to secure the cloud as they would the network or the endpoint.
Marie Hattar's picture
Without visibility, your security teams are more likely to over or under invest in your company’s security infrastructure. That is a big risk to take.