Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

VMware releases patches to address a critical Harbor vulnerability, which was found to impact VMware Cloud Foundation and VMware Harbor Container Registry for PCF. [Read More]
Hackers have penetrated cloud computing networks of some 60 percent of top US companies, with virtually all industry sectors hit. [Read More]
Microsoft announces the general availability of Azure Sentinel, a cloud-based SIEM platform. [Read More]
Cycode, a company that specializes in protecting source code, has emerged from stealth mode with $4.6 million in seed funding. [Read More]
Industry professionals comment on a report that an unprotected database may have exposed the details of nearly everyone in Ecuador. [Read More]
Oracle expands its portfolio with three new services designed to help automatically protect cloud workloads and data. [Read More]
IBM launches z15 mainframe with new capabilities designed to protect sensitive data across hybrid multi-cloud environments. [Read More]
Cloud security firm Lacework has closed a $42 Million Series C funding round from Sutter Hill Ventures and Liberty Ventures, bringing the total raised to $74 million. [Read More]
Imperva learned recently that information belonging to Cloud WAF (Incapsula) customers who had accounts through September 2017 was exposed as a result of a security incident. [Read More]
VMware announces significant enhancements, including in security, to its Virtual Cloud Network offering. [Read More]

FEATURES, INSIGHTS // Cloud Security

rss icon

Ashley Arbuckle's picture
Whatever form your move to the cloud takes, you need the right technologies and talent in place to ensure a secure transition.
Laurence Pitt's picture
The biggest truth about security in public cloud is that it provides security at scale. As a single organization, everything you do is at a scale of one.
John Maddison's picture
Analysis of a vendor’s underlying design and optimization approaches will enable you to select the solution that best meets your organization’s performance and budgetary requirements.
Ashley Arbuckle's picture
What can you do to mitigate the risk you may be inadvertently introducing to your public cloud deployments?
Scott Simkin's picture
Clunky security approaches, pieced together from multiple vendors, result in a fragmented security environment where IT teams must manually correlate data to implement actionable security protections.
Ashley Arbuckle's picture
While it’s easy to deploy new IT services, many of the security tools and processes that we’ve used in our networks and data centers will not work in public clouds.
Travis Greene's picture
Maintaining consistent security controls across the entire hybrid IT environment is growing increasingly complex as more cloud services are adopted.
Scott Simkin's picture
While it's not possible to put a physical firewall in the cloud, security professionals must apply the same rigor to secure the cloud as they would the network or the endpoint.
Marie Hattar's picture
Without visibility, your security teams are more likely to over or under invest in your company’s security infrastructure. That is a big risk to take.
Ting-Fang Yen's picture
With the commoditization of cloud computing in recent years, fraudsters and cybercriminals alike have started to take advantage of public cloud services and dedicated/virtual hosting to conduct attacks.