Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Palo Alto Networks (NYSE: PANW) has agreed to acquire cloud security and compliance firm Evident.io for $300 million in cash. [Read More]
Luminate emerges from stealth with $14 million in funding and a platform that secures access to enterprise applications and resources in hybrid cloud environments [Read More]
Researchers showed how Cortana could have been abused to bypass the Windows lock screen and hack into enterprise systems. Microsoft released a patch, but variations of the attack may still be possible and other voice assistants could also be affected [Read More]
McAfee announced the first product resulting from its purchase of Skyhigh Networks, finalized in January 2018: the McAfee Skyhigh Security Cloud for Azure. [Read More]
US Supreme Court justices grappled Tuesday with the implications of a criminal warrant case involving Microsoft emails. [Read More]
Cisco patches critical vulnerabilities in Unified Communications and Elastic Services Controller products [Read More]
Oracle said Thursday that it has agreed to acquire cloud security firm Zenedge for an undisclosed sum. [Read More]
Two more misconfigured databases exposing the personal details of thousands of people were disclosed late last week [Read More]
Bitglass scanned tens of millions of customer files and found (PDF) a remarkably high number of infections: 44% of organizations had at least one piece of malware in their cloud applications. [Read More]
Kaspersky expands SMB offering with a new product designed to provide an extra layer of security for the Exchange Online email service in Office 365 [Read More]

FEATURES, INSIGHTS // Cloud Security

rss icon

Marie Hattar's picture
To fully realize the benefit of the Public Cloud, it is vital that the same due diligence applied to a physical network is applied to a cloud-based infrastructure.
Ken McAlpine's picture
Dozens of isolated security tools and platforms, regardless of how relevant they are to new cloud-based networks, create their own problem.
Marie Hattar's picture
Given the security events over the past year, ,2017 will be the year in which many finally accept that network infrastructure and security will have to be rethought from the ground up.
David Holmes's picture
What are the possible threat vectors if you were doing a threat model assessment for any of cloud passwords management models?
Jim Ivers's picture
Organizations should fear security concerns when considering moving applications to the cloud. But they need to recognize that moving web applications to the cloud does not make them secure.
Jennifer Blatnik's picture
While using containers to secure your organization is a relatively novel approach, it can lead to cost savings and massive scalability.
David Holmes's picture
How do you secure application components when they’re shifting from cloud to cloud? Any traffic traversing from one public cloud to another is by definition crossing the Internet and should therefore not be trusted.
Alan Cohen's picture
Traditional incident management approaches that rely on network monitoring and detection of attacks are also falling short in today’s agile and distributed computing world.
Alan Cohen's picture
Now that we are coming up on the second “year of the hack”—who said good things only come around once, right?
Marc Solomon's picture
To ensure you understand and can address the main security challenges cloud apps can introduce to your organization, you need additional visibility and context.