Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Industry professionals comment on a report that an unprotected database may have exposed the details of nearly everyone in Ecuador. [Read More]
Oracle expands its portfolio with three new services designed to help automatically protect cloud workloads and data. [Read More]
IBM launches z15 mainframe with new capabilities designed to protect sensitive data across hybrid multi-cloud environments. [Read More]
Cloud security firm Lacework has closed a $42 Million Series C funding round from Sutter Hill Ventures and Liberty Ventures, bringing the total raised to $74 million. [Read More]
Imperva learned recently that information belonging to Cloud WAF (Incapsula) customers who had accounts through September 2017 was exposed as a result of a security incident. [Read More]
VMware announces significant enhancements, including in security, to its Virtual Cloud Network offering. [Read More]
AWS has reached out to customers reportedly targeted by the Capital One hacker, but says none of them reported any significant issues. [Read More]
McAfee acquires NanoSec to strengthen the container security capabilities of its MVISION Cloud and MVISION Server Protection products. [Read More]
A new report from the Cloud Security Alliance (CSA) on the top threats to cloud computing suggests that service providers are improving their security. [Read More]
Vulnerabilities in Microsoft’s Azure cloud services are now worth up to $40,000, and a new security testing environment gives researchers the chance to conduct aggressive tests and earn $300,000. [Read More]

FEATURES, INSIGHTS // Cloud Security

rss icon

Laurence Pitt's picture
The biggest truth about security in public cloud is that it provides security at scale. As a single organization, everything you do is at a scale of one.
John Maddison's picture
Analysis of a vendor’s underlying design and optimization approaches will enable you to select the solution that best meets your organization’s performance and budgetary requirements.
Ashley Arbuckle's picture
What can you do to mitigate the risk you may be inadvertently introducing to your public cloud deployments?
Scott Simkin's picture
Clunky security approaches, pieced together from multiple vendors, result in a fragmented security environment where IT teams must manually correlate data to implement actionable security protections.
Ashley Arbuckle's picture
While it’s easy to deploy new IT services, many of the security tools and processes that we’ve used in our networks and data centers will not work in public clouds.
Travis Greene's picture
Maintaining consistent security controls across the entire hybrid IT environment is growing increasingly complex as more cloud services are adopted.
Scott Simkin's picture
While it's not possible to put a physical firewall in the cloud, security professionals must apply the same rigor to secure the cloud as they would the network or the endpoint.
Marie Hattar's picture
Without visibility, your security teams are more likely to over or under invest in your company’s security infrastructure. That is a big risk to take.
Ting-Fang Yen's picture
With the commoditization of cloud computing in recent years, fraudsters and cybercriminals alike have started to take advantage of public cloud services and dedicated/virtual hosting to conduct attacks.
Ashley Arbuckle's picture
Just like getting off the couch and into shape can be overwhelming, the same can be true for transitioning to the public cloud.