Cloud Security

Cloud Security news, analysis, research, how-to, opinion, and video.

puzzle tower / growth / achievement / risk / balance

cloud security lock

Stay out of security breach headlines: 3 things that must be addressed in your cloud agreement

If done correctly and with the proper level of insight, there are ways to mitigate the risks associated with such breaches.

ransomware
Infographic

Stopping ransomware starts with the security pros

Bromium survey of security professionals shows lapses in their own best practices.

Alert Logic CEO Gray Hall
Q&A

Security-as-a-service supplier Alert Logic started with IDS and blossomed from there

CEO Gray Hall shares insights into what customers are using, where the industry is going

chair spotlight

How CISOs can answer difficult questions from CEOs

A hypothetical conversation can become all too real, and hopefully you are prepared with the answers. Here is a script to help get you started.

0 attack

How to counteract another ‘Dyn-like’ attack

Jim Hurley, a Distinguished Analyst at technology research and advisory firm ISG, shares his insights on what enterprises using cloud-based as-a-services can do to work with their providers and reduce risks to their business from...

karate training

Check Point boosts cloud-security education to help IT security pros stay relevant

Check Point is investing heavily in educating IT pros about the cloud, not only to promote their own cloud security products but to give potential customers the skills they’ll need to keep their jobs as their employers move more and...

cloud security

Cloud security startup RedLock automates public-cloud protection

Cloud security startup RedLock comes out of stealth mode today with a service that helps defend business resources that reside in pubic clouds, gives customers visibility into how these resources are being used and stores records of...

rsa 2017 v2 series branded lg

The state of privacy and security in an ever-evolving world

Privacy and security have evolved. We are seeing various breaches that are devastating organizations. How can you secure your data in a world full of mobile devices, IoT, and the cloud?

security as service 2

Security-as-a-service model gains traction

A new report finds mid-tier companies are increasingly turning to security-as-a-service offerings to manage their network security needs.

clouds

Embrace the hybrid cloud by dispelling security and latency myths

Enterprise leaders are embracing the cloud but remain concerned about hybrid cloud performance and security--two challenges that can be managed more easily than many realize.

1 transform phone payment

10 ways Trusted Identities are used

It is always a struggle to control who gets into your network. A third-party might need access for the contractual work they are doing. HID Global runs through some ways trusted identities are used.

1 running back football

Top 10 ways to achieve agile security

Find out how to enable developers to do what they wanted, when they wanted, as fast as they wanted

Cloud security fears persist, but data migration is a bigger issue

Businesses that consider moving their analytics to the cloud should be more concerned with data migration and network connectivity challenges than worries around security, according to Marc Clark, head of cloud strategy at data...

information security threat primary4

9 biggest information security threats through 2019

Each year, the Information Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its 'Threat Horizon' report to provide a forward-looking view of the biggest security...

icloud icon 2015

Ignore that call from “Apple” about an iCloud breach

Scammers leverage an alleged iCloud account leak that also is likely not real.

apple data centers company tech news

Expert: Apple may have deployed unauthorized patch by mistake

Last month, reports came out that Apple accidentally installed a fake firmware patch on internal development servers. That's a lesson to all companies to be careful about where they get their patches.

disaster recovery button

Disaster recovery: How is your business set up to survive an outage?

Can your business get by with an asynchronous backup or must that offsite server be updated by the second to keep the business up and running at all times.

062216blog trojan horse

Danes targeted by malware spread through Dropbox

Earlier this week, Danish-speaking users were hit by malware spread through Dropbox, but the company responded quickly to shut down the attack

Load More