Cloud Security

Cloud Security news, analysis, research, how-to, opinion, and video.

cybertech 2016 telaviv
amazon web services logo

navy scuba

Defending against insider security threats hangs on trust

If your security strategy only considers malicious insiders when addressing the insider threat, you may be miscalculating the risk. Accidental incidents are nearly impossible to guard against.

securitiy concerns

5 biggest cybersecurity concerns facing CIOs, CISOs in 2016

Carl Leonard, a principal security analyst for Raytheon's Websense cybersecurity software unit, offers insight into the most serious threats CIOs and CISOs are likely to grapple with this year.

ron hovsepian

Privacy rules spur Intralinks growth

In this installment of the IDG CEO Interview Series, Hovsepian spoke with Chief Content Officer John Gallant about how changes in privacy and data sovereignty rules are driving Intralinks’s growth and talked about how the technology...

ballot box voting

18 million targeted voter records exposed by database error

A second database containing voter records has been exposed due to a configuration error. While the first held records that some dismissed inconsequential because the data was public record – ignoring the privacy and security risks...

fraud infog primary

The year in security, identify theft and fraud

There’s a lot we can say about cybersecurity, identify theft and fraud in 2015, but we’re going to let our infographic tell the story.

00 predictions title

Security predictions that could make or break your company

Here are some best guesses about 2016 from more than a dozen vendors and analysts.

08 prediction

Top 15 security predictions for 2016

Cyber security experts and analysts weigh in on what the new year will bring in the world of evolving threats and solutions.

smartphone encryption

Maximum security: Essential tools for everyday encryption

Thanks to technical advances and increased adoption, securing your data and communications is a lot easier than you might think

blurred portrait

Cloud blurs personal and corporate identities

When hackers posted online contact lists and other documents stolen from the AOL account of CIA Director John Brennan, they not only exposed a security breach with national security implications. They also shined a light on a glaring...

west east

What cyber trends to expect in 2016

2015 was another tumultuous year of more cybersecurity attacks and no different from 2014 or even 2013. Here is what to expect in 2016.

cloud security ts

When it comes to cloud security which is better? Heavy hand or gentle policing?

When it comes to successfully managing cloud use within the enterprise, some security organizations try to establish and enforce firm lines between what is permissible and what is banned, while others try to learn what their employees...

behavior clothesline

How the NSA uses behavior analytics to detect threats

The CIO of the National Security Agency says analytics protect the U.S. intelligence community’s private cloud system from internal and external threats.

dropbox smartphone mobile

Phishing blast uses Dropbox to target Hong Kong journalists

Researchers at FireEye have disclosed an ongoing Phishing campaign that's using Dropbox as a delivery platform. The campaign is ran by a group that researchers have named "admin@338" and it's targeting media organizations in Hong Kong...

2015 jeep cherokee

Welcome to the Internet of stupid (hackable) things

The rise of IoT technology brings with it the promise of innovation the likes of which we’ve never seen. But the reality of everything being connected can have unintended consequences, not all of them useful.

lockheed martin assembly

How Lockheed Martin, Cisco and PWC manage cybersecurity

Forget systems … it’s your own people who are your greatest security threats. Luckily, and with training, they can also be your first line of defense.

1 cloud

Three security leaders help you prepare to lead to a more secure cloud

A recap of the Leading Security Change series focused on the mindset and approach needed to move your organization to a more secure cloud

nyc power plant

Are vendors on the wrong path where smart plant security is concerned?

Cyber criminals can’t wait for enterprises to mainly apply access controls and encryption as their toughest solution for securing smart plants.

heat map sample

Heat map to show where burning need is for cybersecurity pros

The National Institute of Standards and Technology (NIST) is funding creation of a heat map visualization tool that will show where cybersecurity jobs are open across the country. The first rendition should be out late next year.

Load More