Cloud Security

Cloud Security news, information, and how-to advice

cloud security
web security

heartbleed bug

Heartbleed flaw still exists at Disqus, ShareThis, and 46 other cloud apps

More than half of the apps Netskope identified as vulnerable to Heartbleed have been patched, but 48 remain at risk.

heartbleed bug

What you need to know about Heartbleed and OpenSSL

A very serious security flaw was discovered with potentially dire consequences for many websites and users.

CDW Integrates with Google Apps for Cloud Collaboration

Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps.

Can data lakes solve cloud security challenges?

What is a "data lake?" And can enterprises use differing data lakes to address cloud security concerns?

Healthcare industry advised to do more thorough risk analyses

Recent study indicates growing list of risks for healthcare security, prompting experts to call for the improved analyses

Box, Dropbox, or drop both?

Box and Dropbox are both popular solutions for cloud-based file sharing, but do they meet enterprise security standards?

HP rolls out Threat Central security intelligence platform

When it comes to security, money isn’t everything. Better security is not a matter of investing more resources, it’s a function of leveraging resources more intelligently.

Logicalis eBook: SAP HANA: The Need for Speed

Without timely business insights, organizations today can suffer logistical, manufacturing, and even financial disaster in a matter of minutes

Attacks similar to Target breach could stall adoption of emerging tech

Could result in as much as a $3 trillion blow to global economy, according to recent study

VMware to aquire mobile security company AirWatch

Well, it seems that the M&A activity that we saw with FireEye picking up Mandiant earlier this month was just the tip of the iceberg in the market.

How to gracefully fall on a sword

One pf the staples of the news around information security of late has been the data breaches that have made the headlines. Be they either of malfeasance on the part of an attacker or by error on the part of someone it happens a lot.

Cloud-based security services poised for rapid growth

Compelling business propositions and BYOD driving security exodus to the nimbus

2013 Cyber Risk Report

The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat landscape.

Exploring the dark side DBaaS offerings

Earlier this summer, a report from 451 Research said that DBaaS offerings will drive IT over the next few years, and the DBaaS industry will grow to about $1.8 billion in 2016 (it was worth just $150 million in 2012).

Shadow IT is undermining your security

A new study from McAfee illustrates the ways shadow IT–employees going rogue and using unauthorized devices or apps–is affecting security

Why security benefits boost mid-market adoption of virtualization

With virtualization on the rise in small- to medium-sized business, its security benefits may be a significant contributing factor

Critics say U.S. tech companies could suffer in warning against China-based cloud services

Congressional commission says that security risk could lead to backlash against American tech companies

Internet Security Threat Report 2014

The Internet Security Threat Report (ISTR) provides an analysis of the year's global threat activity, based on data from the Symantec™ Global Intelligence Network.

Financial service industry takes the lead in curing the third party security headache

Aetna CISO Jim Routh discusses how the ever-expanding threat landscape has led the Financial Services Information Sharing and Analysis Center (FS-ISAC) to improve software security at financial organizations

Best practices for safely moving data in and out of the cloud

Having Nirvanix nightmares? Use these safeguards and rest easy

Georgia Tech warns of emerging threats in cloud, mobile

Study finds that threats call for security measures that are not currently offered by service providers

A conversation with Dave Cole on successfully incorporating security into the product development lifecycle

Dave Cole has successfully addressed and navigated the challenge of incorporating security into product development for the bulk of his career. He recently shared some of his insights on successfully bridging the gap between product...

Load More