Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Cisco patches critical vulnerability in Cloud Services Platform. Flaws also addressed in small business IP phones and other products [Read More]
Sample data provided by scammers claiming to have hacked Equifax may have come from another company’s unprotected QA servers [Read More]
Increasing number of organizations moved to Office 365, but many haven’t migrated due to security concerns, including ransomware and phishing [Read More]
ShiftLeft emerges from stealth mode with new solution designed to protect cloud applications and microservices, and with over $9 million in funding [Read More]
Accenture leaks over 100GB of data, including private keys and credentials, via four unprotected cloud storage containers [Read More]
UpGuard launches CyberRisk, a new product designed to help organizations automate third-party vendor risk management [Read More]
Oracle announces new cloud security services and improvements to existing products at company’s OpenWorld convention [Read More]
Most companies are unprepared for DNS attacks and a quarter of the ones that have been hit reported significant losses [Read More]
Cisco closes backdoor that could have allowed hackers with access to its data centers to hijack customers’ Umbrella virtual appliances [Read More]
Cloudflare says all customers will receive unmetered DDoS mitigation, and organizations will be able to select the geographical location of their SSL keys [Read More]

FEATURES, INSIGHTS // Cloud Security

rss icon

Alan Cohen's picture
Like other forms of technical debt, security debt must be paid down, which ultimately leads to a more agile and secure enterprise.
Danelle Au's picture
If your organization is not equipped to deal with the security of Emergent IT, it is probably not equipped to deal with the security of mainstream applications sanctioned by IT.
Joshua Goldfarb's picture
When moving to the cloud, companies must understand the implications, enumerate the risks, and mitigate those risks accordingly.
Alan Cohen's picture
Today’s network perimeter is increasingly not a single physical or virtual place, yet much of the industry debate is still focused on the perimeter.
David Holmes's picture
Will containers replace traditional operating system virtualization in the same way that virtualization has replaced much of the physical, bare-metal world? And how secure are containers, anyway?
Danelle Au's picture
When it comes to SaaS applications versus on-premise, there are three characteristics that define the need for a different approach to data governance, risk management and security in the cloud.
David Maman's picture
Through simple planning and forethought, organizations can ensure their databases not only meet compliance requirements, but will remain secure.
David Maman's picture
Moving sensitive data into the hands of third-party cloud providers expands and complicates the risk landscape in which companies operate every day.
David Maman's picture
Database Activity Monitoring (DAM) is a crucial part of your compliance and safety profile, but to be effective at protecting your database, you need to understand its limitations.
Danelle Au's picture
Cloud adoption should be a collaborative rather than prescriptive process between employees and IT. With the right mindset and strategy, what employees want and what IT wants can become a proper union in a Venn diagram.