Cloud Security

Cloud Security news, information, and how-to advice

web security
heartbleed bug

heartbleed bug

What you need to know about Heartbleed and OpenSSL

A very serious security flaw was discovered with potentially dire consequences for many websites and users.

Can data lakes solve cloud security challenges?

What is a "data lake?" And can enterprises use differing data lakes to address cloud security concerns?

CDW Integrates with Google Apps for Cloud Collaboration

Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps.

Healthcare industry advised to do more thorough risk analyses

Recent study indicates growing list of risks for healthcare security, prompting experts to call for the improved analyses

Box, Dropbox, or drop both?

Box and Dropbox are both popular solutions for cloud-based file sharing, but do they meet enterprise security standards?

HP rolls out Threat Central security intelligence platform

When it comes to security, money isn’t everything. Better security is not a matter of investing more resources, it’s a function of leveraging resources more intelligently.

Attacks similar to Target breach could stall adoption of emerging tech

Could result in as much as a $3 trillion blow to global economy, according to recent study

Redefining Endpoint Security With Isolation Technology: An innovative, new security architecture

Find out how to secure your enterprise and empower your users to click on anything, anywhere without the fear of being compromised.

VMware to aquire mobile security company AirWatch

Well, it seems that the M&A activity that we saw with FireEye picking up Mandiant earlier this month was just the tip of the iceberg in the market.

How to gracefully fall on a sword

One pf the staples of the news around information security of late has been the data breaches that have made the headlines. Be they either of malfeasance on the part of an attacker or by error on the part of someone it happens a lot.

Cloud-based security services poised for rapid growth

Compelling business propositions and BYOD driving security exodus to the nimbus

Exploring the dark side DBaaS offerings

Earlier this summer, a report from 451 Research said that DBaaS offerings will drive IT over the next few years, and the DBaaS industry will grow to about $1.8 billion in 2016 (it was worth just $150 million in 2012).

Predictive Defense and Real-Time Insight: The Next Step in Advanced Threat Protection

Download this complimentary report, featuring the Gartner Research "Designing an Adaptive Security Architecture for Protection From Advanced Attacks", and learn why organizations can't rely solely on traditional blocking

Shadow IT is undermining your security

A new study from McAfee illustrates the ways shadow IT–employees going rogue and using unauthorized devices or apps–is affecting security

Why security benefits boost mid-market adoption of virtualization

With virtualization on the rise in small- to medium-sized business, its security benefits may be a significant contributing factor

Critics say U.S. tech companies could suffer in warning against China-based cloud services

Congressional commission says that security risk could lead to backlash against American tech companies

Financial service industry takes the lead in curing the third party security headache

Aetna CISO Jim Routh discusses how the ever-expanding threat landscape has led the Financial Services Information Sharing and Analysis Center (FS-ISAC) to improve software security at financial organizations

Healthcare Information Management: A New Urgency

With the challenges of an evolving regulatory environment and the information overload problem with management practices, many organizations have now reached an inflection point.

Best practices for safely moving data in and out of the cloud

Having Nirvanix nightmares? Use these safeguards and rest easy

Georgia Tech warns of emerging threats in cloud, mobile

Study finds that threats call for security measures that are not currently offered by service providers

A conversation with Dave Cole on successfully incorporating security into the product development lifecycle

Dave Cole has successfully addressed and navigated the challenge of incorporating security into product development for the bulk of his career. He recently shared some of his insights on successfully bridging the gap between product...

Let others define the security challenge to solve more problems

When Karen found the spreadsheet, she reviewed the information. What she found was clearly related to the trading floor. She then made an assumption that if the spreadsheet looked important, it needed to be protected. She saw a...

Load More