Security Experts:

long dotted


CyberArk says it can now automate detection, alerting and response for unmanaged and potentially risky Amazon Web Services (AWS) accounts. [Read More]
RackTop Systems, a company that provides a platform incorporating data storage, security and compliance, raises $15 million in a Series A funding round. [Read More]
VMware launches VMware Service-defined Firewall, a firewall that focuses on known good behavior rather than chasing potential threats. [Read More]
Microsoft unveils two new cloud-based security technologies: Microsoft Azure Sentinel and Microsoft Threat Experts. [Read More]
Intel announces SGX Card, new capabilities to its Threat Detection Technology, the Host-based Firmware Analyzer tool, and the results of various partnerships. [Read More]
Malicious actors could plant backdoors on bare metal cloud servers and use them to disrupt applications, steal data, and launch ransomware attacks, researchers warn. [Read More]
Companies are increasingly moving sensitive data to the cloud, but cybersecurity is still a problem for many, according to a new report from Oracle and KPMG. [Read More]
Proof-of-concept (PoC) code is now publicly available for a recently disclosed container escape vulnerability impacting popular products, including AWS, Google Cloud, and numerous Linux distributions. [Read More]
Symantec has acquired Luminate Security, an Israel-based company that specializes in securing access to corporate applications in hybrid cloud environments. [Read More]
A vulnerability in the runc container runtime could allow malicious containers to achieve root-level code execution on the host. AWS, Google Cloud and Linux distributions are affected. [Read More]

FEATURES, INSIGHTS // Cloud Security

rss icon

Ashley Arbuckle's picture
Whatever form your move to the cloud takes, you need the right technologies and talent in place to ensure a secure transition.
Laurence Pitt's picture
The biggest truth about security in public cloud is that it provides security at scale. As a single organization, everything you do is at a scale of one.
John Maddison's picture
Analysis of a vendor’s underlying design and optimization approaches will enable you to select the solution that best meets your organization’s performance and budgetary requirements.
Ashley Arbuckle's picture
What can you do to mitigate the risk you may be inadvertently introducing to your public cloud deployments?
Scott Simkin's picture
Clunky security approaches, pieced together from multiple vendors, result in a fragmented security environment where IT teams must manually correlate data to implement actionable security protections.
Ashley Arbuckle's picture
While it’s easy to deploy new IT services, many of the security tools and processes that we’ve used in our networks and data centers will not work in public clouds.
Travis Greene's picture
Maintaining consistent security controls across the entire hybrid IT environment is growing increasingly complex as more cloud services are adopted.
Scott Simkin's picture
While it's not possible to put a physical firewall in the cloud, security professionals must apply the same rigor to secure the cloud as they would the network or the endpoint.
Marie Hattar's picture
Without visibility, your security teams are more likely to over or under invest in your company’s security infrastructure. That is a big risk to take.
Ting-Fang Yen's picture
With the commoditization of cloud computing in recent years, fraudsters and cybercriminals alike have started to take advantage of public cloud services and dedicated/virtual hosting to conduct attacks.