Cloud Security

Cloud Security news, analysis, research, how-to, opinion, and video.

cybersecurity shield and gear image
cloud security ts

hacking cybersecurity padlock motherboard

Could the security industry have it all wrong?

Shifting focus from perimeters to people is crucial for success in the new era of mobility and cloud.

pixabay cybersecurity stock

Security pros choose their top enterprise-class cybersecurity vendors

Cisco, IBM, Symantec and McAfee lead the cybersecurity vendors in mind share, but the race has just begun.

techy connected cloud

Automating cloud compliance

The cloud is here, Its dynamic,scalable and ever changing. yesterdays bi yearly or yearly audit snap shots don't meet this new computing platforms needs to achieve compliance. It's time for continuous audits and a single risk...

europe data privacy rules primary2

Hacking the GDPR

Using anonymization and pseudonymization to reduce the overhead of GDPR compliance.

analyze / inspect / examine / find / research / data / magnifying glass

Identify risk in your hybrid cloud – and yes, there's plenty of it!

In the second part of this series, we examine the actual areas of risks in the hybrid cloud journey – and some of them may surprise you. This involves two elements: data and humans.


Cylance blamed for DirectDefense’s ‘botnet’ disclosure

Twenty-four hours after Carbon Black responded to a report from DirectDefense that their Cb Response product was leaking customer information (it doesn't), one company executive is pointing the finger at Cylance as the source of the...

most in demand it skills

How to address the cybersecurity analytics and operations skills shortage

The ability to detect and respond to threats is greatly impeded by a lack of cybersecurity skills and staff. Leading organizations offer a few suggestions.


Pentest firm calls Carbon Black "world’s largest pay-for-play data exfiltration botnet"

On Wednesday, DirectDefense, Inc. disclosed that they've discovered hundreds of thousands of files from Carbon Black customers. The discovery is said to pose a significant risk to Carbon Black's clients, because of the company's...

03 ignore

When it comes to the cloud, do CISOs have their heads in the sand?

Not only has the cloud enabled companies to access multiple applications online via Software as a Service (SaaS), but it has also made internal infrastructure more agile and scalable, and fueled flexible workforce collaboration. This...

artificial intelligence / machine learning

Moving forward with machine learning for cybersecurity

Cybersecurity professionals see potential in machine learning, but they need education and guidance.


Black Hat 2017: Insightful, but too much hype

Black Hat 2017 was a busy show, highlighting a healthy cybersecurity industry. But there was too much hype, misunderstanding, and proprietary agendas.


Ticking bomb #sprawl! 3 ways to combat it now

Understanding how hybrid cloud economics changes behavior – snapshotting in particular – and how that results in unintended security exposure, both on-prem and in the cloud. But first, an easy to understand analogy about home...

Google logo fisheye

Configuration errors blamed for sensitive data exposed via Google Groups

Researchers at RedLock, working within the Cloud Security Intelligence team, say they've discovered hundreds of organizations exposing sensitive data via Google Groups, pinning the cause on basic configuration issues.

What to expect at Black Hat: Security hype and reality

Look for machine learning, automation, orchestration, integration and threat intelligence to dominate the Black Hat security conference.


Tech Talk: The latest on Azure Stack, cyberattacks, the next iPhone and ... keyboards

Get the details on Microsoft's new Azure Stack, why cyberattacks never seem to end, the fate of Apple's Touch ID and why QWERTY keyboards are now tech relics.

Cloud Security

Top cloud security controls you should be using

Human error is one of the top reasons for data breaches in the cloud, as administrators forget to turn on basic security controls. Whether it is Amazon Web Services, Microsoft Azure, or Google Cloud Platform, keep these rules in mind...


Who's responsible for cloud security? | Tech Talk Ep 1

IDG editors talk about the common misperceptions about public cloud storage, including who's ultimately responsible for data security.

cloud security

Lacework unmasks hidden attackers amid data center and cloud chaos

Managing even a local data center is a tough job. Keeping a cloud secure is even more difficult. Lacework helps to filter all the chaos, removing false positives, and generating actionable threat intelligence in real-time for IT teams...

Load More