Cloud Security

Cloud Security news, analysis, research, how-to, opinion, and video.

cloud question
cloud security decisions

01 intro container

6 questions CISOs need to ask about containers

Lars Herrmann, general manager, Integrated Solutions Business Unit at Red Hat, poses six questions CISOs must ask when evaluating container platforms.

cloud data warehouse

Ransomware prevalent in cloud-based malware

Cloud-based filesharing, collaboration and social networking applications are common vectors for malware infections, a large portion of of which are ransomware delivery vehicles, according to a report released today

Best practices for incident response in the age of cloud

Having an incident response platform can help internal and external teams collaborate, track incident response processes and automate key security tasks

third party threats

5 security practices hackers say make their lives harder

Hackers believe no password is safe from a determined attacker, but they agree that five key security measures can make it a lot harder to penetrate enterprise networks.

pixelated clouds reflecting on building windows

Experts challenge Skyhigh's patent for cloud-based encryption gateway

Skyhigh Networks, Inc., announced today that it has received a patent for using a hosted gateway to encrypt and decrypt data moving between users and cloud services such as Office 365, but some experts say that the technology new...

IDVector Pro USB

Startup IDVector anonymizes like Tor

A pair of former defense cyber security contractors is launching IDVector, a service that creates encrypted connections through an anonymizing network to shield users’ identities and locations and to protect their machines from...

risk reward ts

RiskSense lands $7M for assessment service

RiskSense, software-as-a-service that evaluates the security of corporate networks and generates a risk score, has been self-financed since its launch last year, but now has harnessed venture funding to help boost its R&D and hire...

New features in Windows 10 laptop

Respect: Windows 10 security impresses hackers

Windows is a popular attack target for criminals and researchers alike, but Microsoft has done a good job of making it harder to target security flaws in the OS

Andrew Krug and Alex McCormack

Four free tools for handling Amazon Web Services security incident response

Using AWS’s API software developer’s kit or its command line interface, customers can write their own tools for imaging disk instances that have been compromised, say Andrew Krug and Alex McCormack. The pair if researchers presented...

cloud security

CASB delivers must-have protection for your SaaS apps

NetSkope edges CipherCloud and Bitglass in test of three ingenious and powerful cloud access security brokers.

game of thrones

Game of Thrones can teach you valuable security lessons

With new hacking techniques, malware, viruses and threats being created faster than Melisandre’s demon babies, the web is indeed dark and full of terrors. Here are seven lessons for security managers pulled straight out of Westeros. ...

01 intro

9 data security tips for cloud migration

For organizations considering cloud migration, here are nine proactive steps that companies can take to ensure a smooth transition and get tighter cloud security.

security code big data cyberespionage DDoS

Attackers launch multi-vector DDoS attacks that use DNSSEC amplification

Incident responders from Akamai recently helped mitigate a DDoS attack against an unnamed European media organization that used six different attack techniques, including DNSSEC-based DNS amplification.

security padlock on keyboard locked computer stock

Cisco aims to simplify security

By combining its network visibility and breadth of integrated products, Cisco aims to make it simple for distributed and mobile businesses to deploy effective security while reducing the complexity required to manage it.

cloud security challenges 1

What cloud security challenges keep CISOs up at night?

With the network perimeter wide open, see what chief security officers can do to keep everything secure?

cloud security

Cisco reinforces cloud security technology with $293M CloudLock buy

Cisco today said it would make its fifth acquisition of the year by acquiring cyber security provider CloudLock for $293 million.

ransomware

How to prepare for (and prevent) ransomware attacks

The only sure way to protect yourself or your company from 'ransomware' is with foolproof file backups. These three backup options can all help recover from ransomware attacks.

PowerShell for Exchange Admins

Salesforce puts Lightning in a tightly sealed bottle

The LockerService architecture isolates components in their own containers and stops them from calling undocumented or private APIs

Load More