Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Within the increasing adoption of container technology, hybrid on-premise and cloud configurations are growing, while concern over investment in security remains high. [Read More]
SIEM solutions provider Exabeam this week announced the acquisition of cloud application security company SkyFormation. [Read More]
Many VMware products are affected by SACK Panic and SACK Slowness, two recently disclosed Linux kernel vulnerabilities that can be exploited for remote DoS attacks. [Read More]
Kaspersky researchers use vulnerabilities and social engineering to demonstrate that smart homes can be hacked. [Read More]
Attunity, a Qlik-owned data integration and big data management company used by half of Fortune 100 firms, exposed at least one terabyte of data through unprotected Amazon S3 buckets. [Read More]
Cisco has patched critical and high severity authentication bypass, code execution, and file upload/download vulnerabilities in Data Center Network Manager. [Read More]
AWS launches VPC Traffic Mirroring, a new feature that allows users to capture and inspect network traffic from their Amazon EC2 instances. [Read More]
AWS announces general availability of Security Hub, a service that aggregates and prioritizes alerts from AWS and 30 third-party security tools. [Read More]
Real-time application behavior analytics, control, and protection provider TrueFort has raised $13.7 million in a Series A funding round. [Read More]
Cloud data protection and management provider Druva announced $130 million in new funding, which brings the total raised by the company to date to $328 million. [Read More]

FEATURES, INSIGHTS // Cloud Security

rss icon

Ashley Arbuckle's picture
With more leading-edge IT capabilities available only in the cloud, companies that can migrate more of their applications accordingly stand to gain even greater agility, scalability, and efficiencies required for business success.
Travis Greene's picture
Shadow IT 2.0 is a symptom of a bigger problem – the inability to maintain digital competitive advantage due to the insufficient pace of code deployment.
Scott Simkin's picture
Attackers have developed anti-VM analysis techniques to allow the malware to recognize when it is being run on a virtual machine and fail to execute, meaning the system or threat analytics cannot make a verdict determination or extract intelligence from the sample.
Marie Hattar's picture
To fully realize the benefit of the Public Cloud, it is vital that the same due diligence applied to a physical network is applied to a cloud-based infrastructure.
Ken McAlpine's picture
Dozens of isolated security tools and platforms, regardless of how relevant they are to new cloud-based networks, create their own problem.
Marie Hattar's picture
Given the security events over the past year, ,2017 will be the year in which many finally accept that network infrastructure and security will have to be rethought from the ground up.
David Holmes's picture
What are the possible threat vectors if you were doing a threat model assessment for any of cloud passwords management models?
Jim Ivers's picture
Organizations should fear security concerns when considering moving applications to the cloud. But they need to recognize that moving web applications to the cloud does not make them secure.
Jennifer Blatnik's picture
While using containers to secure your organization is a relatively novel approach, it can lead to cost savings and massive scalability.
David Holmes's picture
How do you secure application components when they’re shifting from cloud to cloud? Any traffic traversing from one public cloud to another is by definition crossing the Internet and should therefore not be trusted.