Cloud Computing

Cloud computing news, analysis, research, how-to, opinion, and video.

Black Hat 2015
SSL padlock icon security

hacked hacker breach security

Risk aware IAM for an insecure world

In a world full of uncertainties and data breaches, IDaaS providers must deliver more than ever, faster than ever, for businesses to succeed at building trusted relationships and delighting customers at every interaction.

puzzle solution / key / unlocking success

OneLogin hack exposed sensitive US customer data and ability to decrypt data

OneLogin warned that US customer data was potentially compromised,“including the ability to decrypt encrypted data.”

stock security

Cloud solutions: The danger of 'floating' contracts

In most cloud engagements these days, it is not only the customer’s data that is in the cloud, but also many key parts of the vendor contract as well. That is, the average cloud vendor today generally places several key areas of the...

anthony grieco
Q&A

Cisco security exec: ‘Connected devices are creating 277 times more data than people are’

CSO Managing Editor Ryan Francis recently spoke with Anthony Grieco, senior director and trust strategy officer at Cisco’s Security and Trust Organization, about how organizations can securely incorporate new technologies as they...

cloud computing data center

DevOps and cloud infrastructure permutations

The cloud has one DevOps advantage - it limits the number of permutations of storage, network, and CPU combinations that can be used for infrastructure (IaaS).

Facebook headquarters

Facebook hit with maximum fine for breaking French privacy law

The French data protection watchdog has imposed its harshest penalty on Facebook for six breaches of French privacy law.

cloud blueprint schematic

Achieving compliance in the cloud

More and more organizations are moving towards cloud technologies for scalability, cost reduction, and new service offerings. In this short article we will review cloud basics and look at auditing for compliance challenges.

Surface Pro tablet running windows 10 and a windows phone
video

Windows 10 Fall Creators Update Preview

Microsoft has announced its Windows 10 Fall Creators Preview, with new features like Timeline, Pick Up Where You Left Off, and the new Story Remix. Here's what the new update will include.

vnt 034 citrix 1.00 00 44 16.still005
video

Interview: Tim Minahan, SVP & CMO, Citrix

Tim Minahan, Chief Marketing Officer and SVP of Citrix, discusses how Citrix is blending the art and science of marketing, his experience with moving to the cloud and the evolving role of the CMO.

email cloud

Email, email, in the cloud

The transition from on-premises to cloud-based email is an opportunity to tighten security controls.

internet of things

Cloudflare wants to secure IoT connections to the internet

Web optimization and security firm Cloudflare launched a service that could allow IoT manufacturers to protect devices from attacks and deploy patches much quicker.

security as service 2

Security-as-a-service model gains traction

A new report finds mid-tier companies are increasingly turning to security-as-a-service offerings to manage their network security needs.

cloud security

10 interview questions for hiring cloud-literate security staff

The answers will paint a picture of whether this candidate understands cloud security.

cloud security

Finding and protecting the crown jewels

Layer 7 visibility and stateful application controls are important aspects of cloud security—protecting business-critical applications and data.

walking dead cloud zombies apocalypse

Don't get bit by zombie cloud data

Data you thought you had deleted from the cloud can come back to haunt you. Get to know your provider’s data deletion policy

devops

The intersection of DevOps and application security

This article discusses DevOps security and the application security tools that need to be embedded within its process. These additions enable proper InfoSec protection of web applications.

template c100.00 42 54 37.still001
video

Mingis on Tech: How IT can prep for robots and avoid cloud migration woes

Here's how IT can get ready for the coming robotics revolution at work -- and avoid messing up a big move to the cloud.

fave raves security

5 must-have security tools

Trusted IT security gear protects data, authenticates users and monitors systems for suspicious events.

Load More