Cloud Security

Cloud Security news, analysis, research, how-to, opinion, and video.

cloud data warehouse
cybersecurity budgets

cloud data warehouse

Visibility, security top concerns for cloud computing adoption

Enterprises considering adopting public clouds are concerned about where their data is located and how it's protected, according to a new survey by IDG.

cloud building security

How to protect your marketing team amidst security threats

Protect your marketing team as security threats loom with these tips and best practices.

Securing the cloud endpoint

For cloud’s sake, let’s reduce our security dependence on browsers

10 AWS configuration mistakes and how to avoid them

10 AWS security blunders and how to avoid them

Amazon Web Services is easy to work with -- but can easily compromise your environment with a single mistake

nubeva image

Startup Nubeva pitches Security-as-a-Service in the cloud

A team made up of executives from Aruba Networks and Panzura are out with a new self-funded startup this week that aims to deploy security tools that enterprises use in their campus and extend it to the cloud.

cloud question

Unpacking new HHS guidelines on healthcare data in the cloud

The new HHS guidelines recognize the growing importance of cloud computing in healthcare and are the right step in the bringing cloud service providers into the broader discussion on healthcare data security and privacy. However,...

cloud question

What to think about when moving to the cloud

Thinking about making the idea of cloud a reality for today's enterprise

cloud security decisions

Tenable brings network visibility into Google Cloud Platform

Tenable SecurityCenter Continuous View gives IT administrators visibility over their applications hosted in Google Cloud Platform.

01 intro container

6 questions CISOs need to ask about containers

Lars Herrmann, general manager, Integrated Solutions Business Unit at Red Hat, poses six questions CISOs must ask when evaluating container platforms.

cloud data warehouse

Ransomware prevalent in cloud-based malware

Cloud-based filesharing, collaboration and social networking applications are common vectors for malware infections, a large portion of of which are ransomware delivery vehicles, according to a report released today

Best practices for incident response in the age of cloud

Having an incident response platform can help internal and external teams collaborate, track incident response processes and automate key security tasks

third party threats

5 security practices hackers say make their lives harder

Hackers believe no password is safe from a determined attacker, but they agree that five key security measures can make it a lot harder to penetrate enterprise networks.

pixelated clouds reflecting on building windows

Experts challenge Skyhigh's patent for cloud-based encryption gateway

Skyhigh Networks, Inc., announced today that it has received a patent for using a hosted gateway to encrypt and decrypt data moving between users and cloud services such as Office 365, but some experts say that the technology new...

IDVector Pro USB

Startup IDVector anonymizes like Tor

A pair of former defense cyber security contractors is launching IDVector, a service that creates encrypted connections through an anonymizing network to shield users’ identities and locations and to protect their machines from...

risk reward ts

RiskSense lands $7M for assessment service

RiskSense, software-as-a-service that evaluates the security of corporate networks and generates a risk score, has been self-financed since its launch last year, but now has harnessed venture funding to help boost its R&D and hire...

New features in Windows 10 laptop

Respect: Windows 10 security impresses hackers

Windows is a popular attack target for criminals and researchers alike, but Microsoft has done a good job of making it harder to target security flaws in the OS

Andrew Krug and Alex McCormack

Four free tools for handling Amazon Web Services security incident response

Using AWS’s API software developer’s kit or its command line interface, customers can write their own tools for imaging disk instances that have been compromised, say Andrew Krug and Alex McCormack. The pair if researchers presented...

cloud security

CASB delivers must-have protection for your SaaS apps

NetSkope edges CipherCloud and Bitglass in test of three ingenious and powerful cloud access security brokers.

Load More