Cloud Security

Cloud Security news, analysis, research, how-to, opinion, and video.

cloud data disaster breach 100453001 orig
ddos krebs

man person clouds tablet

Are you ready to make the move to public cloud securely to leverage its benefits?

In the next wave of digital transformation, cloud computing can provide huge benefits to enterprises as compute cost goes down to drive down the cost of IT for organizations. At the same time, cloud features such as agility,...

Cyber security breach attack on monitor with binary code

IT audits must consider the cyber kill chain and much more!

Its not enough to perform an IT audit to achieve compliance alone, Today's threat landscape includes sophisticated APT's, Advanced Persistent Threats, Remote access Trojans and Ransomeware to name a few, In order for an IT audit to...

keys ring of old antique keys stock

The best online backup service for securely encrypting your data

Every hosted backup solution manages encrypted storage a little differently. We look at who gives subscribers the keys to the castle.

healthcare cloud

This hospital is moving to Amazon’s cloud to protect its network

Contrary to traditional beliefs, health care organizations can use the public cloud, with the right precautions in place.

cloud question

What to think about when moving to the cloud

Thinking about making the idea of cloud a reality for today's enterprise

cloud security decisions

Tenable brings network visibility into Google Cloud Platform

Tenable SecurityCenter Continuous View gives IT administrators visibility over their applications hosted in Google Cloud Platform.

01 intro container

6 questions CISOs need to ask about containers

Lars Herrmann, general manager, Integrated Solutions Business Unit at Red Hat, poses six questions CISOs must ask when evaluating container platforms.

cloud data warehouse

Ransomware prevalent in cloud-based malware

Cloud-based filesharing, collaboration and social networking applications are common vectors for malware infections, a large portion of of which are ransomware delivery vehicles, according to a report released today


How to get a more cost-effective cyber insurance policy

Tips on how to mitigate risks and get more bang for your buck on cyber insurance

emergency response alarm critical

Stop missing the vendor alerts you need

The tools you are using could be creating more work and missing key signals

clouds on a mostly clear sky

CASB can help address gaps in cyber security

The emerging and fast growing segment of cloud security is the Cloud Access Security Broker (CASB) and can help enterprises solve today's cyber security challenges to a great extent.

third party threats

5 security practices hackers say make their lives harder

Hackers believe no password is safe from a determined attacker, but they agree that five key security measures can make it a lot harder to penetrate enterprise networks.

dropbox logo sign

Dropbox prompts certain users to change their passwords

Dropbox is asking users who signed up before mid-2012 to change their passwords if they haven’t done so since then.

pixelated clouds reflecting on building windows

Experts challenge Skyhigh's patent for cloud-based encryption gateway

Skyhigh Networks, Inc., announced today that it has received a patent for using a hosted gateway to encrypt and decrypt data moving between users and cloud services such as Office 365, but some experts say that the technology is...

risk reward ts

RiskSense lands $7M for assessment service

RiskSense, software-as-a-service that evaluates the security of corporate networks and generates a risk score, has been self-financed since its launch last year, but now has harnessed venture funding to help boost its R&D and hire...

New features in Windows 10 laptop

Respect: Windows 10 security impresses hackers

Windows is a popular attack target for criminals and researchers alike, but Microsoft has done a good job of making it harder to target security flaws in the OS

close up of outdoor water faucet nozzle against cloudy sky

What's happening with email?

What’s in store for email security in 2016 and beyond?

cloud security decisions

What is a cloud access security broker and why do I need one?

CASB products provide a variety of security measures, including access control, firewall, identity management, anti-malware, DLP, encryption and threat management. So, what are the basic use cases for CASB?

Load More