Cloud Security

Cloud Security news, analysis, research, how-to, opinion, and video.

harvard university
managed security service providers

umbrella clouds

What is the right DDoS protection cloud service for your organization?

An expert’s eye view into how top DDoS protection cloud services perform on many levels.

Illustration of five business people riding a bicycle

Security through the entire life cycle

What enterprises can learn from the recent FDIC breach and how to implement better controls to keep data secure.

internet security

Apache incubating project promises new Internet security framework

The newly announced Apache Milagro (incubating) project seeks to end to centralized certificates and passwords in a world that has shifted from client-server to cloud, IoT and containerized applications.

bodium castle fortress

The impending death of the traditional Intranet

In medieval times castles were typically protected by a moat or something akin to it like an open ditch. These fortifications served a purpose to be certain but, over time they were found to be dated an ineffective as tactics...

more productivity tips

IT leaders pick productivity over security

Implementing security measures can make systems run slower and essentially bog down productivity, which is causing some enterprises to abandon effective security measures. Two recent studies highlight the severity of lacking...

wooden blocks

IBM offers advice on how to secure blockchain in the cloud

Cloud providers hosting the blockchain secure transactions technology should take additional security steps to protect those records, IBM recommends

breach title

Enterprises fall behind on protecting against phishing, detecting breaches

The ninth annual Verizon Data Breach Report contains bad news on multiple fronts, including click-through rates on phishing messages, how long it takes companies to detect breaches, and even whether companies spot the breaches at all....

mexican election vote

MongoDB configuration error exposed 93 million Mexican voter records

A 132 GB database, containing the personal information on 93.4 million Mexican voters has finally been taken offline. The database sat exposed to the public for at least eight days after its discovery by researcher Chris Vickery, but...

0 title hacking competition

Hacking competitions that will get you noticed

The government's announcement of a pilot program "Hack the Pentagon" serves as a reminder of the opportunities available to newbies trying to get a foot in the door of the cyber security industry.

08 prediction

Top 15 security predictions for 2016

Cyber security experts and analysts weigh in on what the new year will bring in the world of evolving threats and solutions.

cloud computing pondering reflective mystery

How compliance can be an excuse to shun the cloud

Companies in heavily regulated industries say they can't embrace the cloud due to compliance. That's just an excuse.

us eu handshake

The impact of the new Trans-Atlantic privacy law

After 20 years of relative calm regarding the handling of personal data of EU citizens by U.S. companies, events over the past six months have instigated widespread reform. While the resolution is yet to be confirmed, the building...

01 dbaas title

Top 10 DBaaS security concerns

Survey shows the worries users have of their databases in the cloud.

inspection stormtroopers

Security and small thermal exhaust ports

I have always marvelled at the inability of the Empire and later the First Order to build a evil death machine without a simple exposure causing them issue. You would have thought that they would have reviewed the data after the...

smartphone encryption

MIT, Harvard researchers push new way for users to control access to personal data

Cryptography researchers at MIT and Harvard have developed software called Sieve that is designed to help users keep track of encrypted personal data and better manage it in the cloud.

jennifer lawrence oscars

Celebgate: Social engineering used to steal celebrity nude photos

On Tuesday, the Department of Justice, U.S. Attorney’s Office, Central District of California announced that Ryan Collins, 36, of Lancaster, Pennsylvania, plead guilty to violation of the Computer Fraud and Abuse Act.

cash 100s bills

A boatload of money to be spent on securing PCs, IoT and mobile devices

Forecast says $655 billion will be spent on securing personal computers, Internet of Things (IoT) and mobile devices.

cloud security

IT is getting cloud storage security all wrong

Two recent reports confirm that your greatest security threat is your users, not outside hackers.

Load More