Cloud Security

Cloud Security | News, how-tos, features, reviews, and videos

Architectural dome reflected in a crystal ball. / future / predictions / forecast / fortune telling

iPhone security / unlocking, hacking or breaking into iPhone

Improve end user device security and embrace the future via the cloud

Cloud has reshaped the client/server model. Are you evolving your architecture to suit?

horizon transformation change future hope bright

Only a safe cloud can fuel digital transformation

As the world goes digital, organizations will follow. Cloud computing will intensify that journey — but it must be secure.

cssh 013.00 22 53 39.still001
video

DJI's bounty problems and video surveillance programs | Salted Hash Ep 13

Host Steve Ragan unpacks the latest news about Chinese company DJI's bug bounty program, plus new developments in video surveillance and more, with Fahmida Rashid.

wide 2017.12.06 11.00.51.avi.11 21 57 57.still001
video

Zero Trust networks and enterprise security strategy | Salted Hash Ep 12

Executives at cloud services vendor Akamai -- David Lewis, global security advocate; Andy Ellis, CSO; and Charlie Gero, CTO -- talk with host Steve Ragan about the evolving role of security in the enterprise.

VMware headquarters

How VMware is re-thinking security for the cloud era

With breaches making headlines around the world, the IT marketplace is looking for new ways to protect applications and data. With App Defense, VMware has built a security product with virtualization in mind.

Cloud_Security
video

Who's responsible for cloud security? | Tech Talk Pilot Episode, Pt 2

IDG editors talk about the common misperceptions about public cloud storage, including who's ultimately responsible for data security.

puzzle tower / growth / achievement / risk / balance

Insights from the Gartner Security & Risk Summit

The Gartner Security & Risk Summit took place the week of June 12-15. Here are the key insights relevant to CIOs and other IT leaders.

cloud security lock

Stay out of security breach headlines: 3 things that must be addressed in your cloud agreement

If done correctly and with the proper level of insight, there are ways to mitigate the risks associated with such breaches.

ransomware
Infographic

Stopping ransomware starts with the security pros

Bromium survey of security professionals shows lapses in their own best practices.

Alert Logic CEO Gray Hall
Q&A

Security-as-a-service supplier Alert Logic started with IDS and blossomed from there

CEO Gray Hall shares insights into what customers are using, where the industry is going

chair spotlight

How CISOs can answer difficult questions from CEOs

A hypothetical conversation can become all too real, and hopefully you are prepared with the answers. Here is a script to help get you started.

0 attack

How to counteract another ‘Dyn-like’ attack

Jim Hurley, a Distinguished Analyst at technology research and advisory firm ISG, shares his insights on what enterprises using cloud-based as-a-services can do to work with their providers and reduce risks to their business from...

karate training

Check Point boosts cloud-security education to help IT security pros stay relevant

Check Point is investing heavily in educating IT pros about the cloud, not only to promote their own cloud security products but to give potential customers the skills they’ll need to keep their jobs as their employers move more and...

cloud security

Cloud security startup RedLock automates public-cloud protection

Cloud security startup RedLock comes out of stealth mode today with a service that helps defend business resources that reside in pubic clouds, gives customers visibility into how these resources are being used and stores records of...

rsa 2017 v2 series branded lg

The state of privacy and security in an ever-evolving world

Privacy and security have evolved. We are seeing various breaches that are devastating organizations. How can you secure your data in a world full of mobile devices, IoT, and the cloud?

security as service 2

Security-as-a-service model gains traction

A new report finds mid-tier companies are increasingly turning to security-as-a-service offerings to manage their network security needs.

clouds

Embrace the hybrid cloud by dispelling security and latency myths

Enterprise leaders are embracing the cloud but remain concerned about hybrid cloud performance and security--two challenges that can be managed more easily than many realize.

1 transform phone payment

10 ways Trusted Identities are used

It is always a struggle to control who gets into your network. A third-party might need access for the contractual work they are doing. HID Global runs through some ways trusted identities are used.

Load More