Cloud Security

Cloud Security news, analysis, research, how-to, opinion, and video.

cloud computing data center

chair spotlight

How CISOs can answer difficult questions from CEOs

A hypothetical conversation can become all too real, and hopefully you are prepared with the answers. Here is a script to help get you started.

0 attack

How to counteract another ‘Dyn-like’ attack

Jim Hurley, a Distinguished Analyst at technology research and advisory firm ISG, shares his insights on what enterprises using cloud-based as-a-services can do to work with their providers and reduce risks to their business from...

cloud security

OPAQ Networks gains John Terrill as CISO after acquisition

Drawbridge Networks CEO Terrill stays on with OPAQ as its chief information security officer after it acquired his company.

Cloud Security

Cloud security provider Qualys hires Mark Butler as CISO

Butler will be help other CISOs at Qualys's customers drive their digital transformation initiatives.

employees technology planning data [Computerworld, January-February 2017 - HR IT]

Cyber Resilience 2.0, now shipping

The heads of IT security gathered at a recent Think Tank and agreed on a next generation definition of cyber resilience.

security as service 2

Security-as-a-service model gains traction

A new report finds mid-tier companies are increasingly turning to security-as-a-service offerings to manage their network security needs.

cloud security

10 interview questions for hiring cloud-literate security staff

The answers will paint a picture of whether this candidate understands cloud security.

ibm watson

IBM’s security business up 10 percent, powered by Watson

CSO checked in with Marc van Zadelhoff, general manager at IBM Security - one of IBM’s four strategic areas (cloud, analytics, and mobile being the other three) - for a deeper dive into its security initiatives.

1 transform phone payment

10 ways Trusted Identities are used

It is always a struggle to control who gets into your network. A third-party might need access for the contractual work they are doing. HID Global runs through some ways trusted identities are used.

Security hurdles in cloud collaboration applications, and how to clear them

Security is a primary reason why organizations hold out on cloud-based productivity/collaboration platforms

thinkstock privacy please

FCC privacy ruling could leave enterprises' data vulnerable

The recent repeal of new FCC rules designed to strengthen personal privacy among consumers by limiting the uses ISPs can make of their personal data also has implications for companies who use these services. Security and privacy...

1 running back football

Top 10 ways to achieve agile security

Find out how to enable developers to do what they wanted, when they wanted, as fast as they wanted

colt single action revolver

The keyboard and the Colt

Venture capitalists talk about an unfair competitive advantage. Business experts talk about leveling the playing field. And everyone else just talks about fair play. But when it comes to warfare everyone wants the unfair, overwhelming...

icloud rain

The iCloud hackers' bitcoin ransom looks like a fake

A group of hackers who claimed to hold millions of iCloud accounts for ransom said on Friday they'd been paid. But one bitcoin expert says that's bogus.

body camera police bodycam

Cloudy understanding of securing bodycam footage

Law enforcement agents are wearing body cams, but what's happening to the video

information security threat primary4

9 biggest information security threats through 2019

Each year, the Information Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its 'Threat Horizon' report to provide a forward-looking view of the biggest security...

icloud rain

Ignore that call from “Apple” about an iCloud breach

Scammers leverage an alleged iCloud account leak that also is likely not real.

cloud architecture skyscrapers

Problems that arise with cloud to cloud interactions

Some companies have multiple applications in different public clouds. There is a possibility that some public cloud applications need to access another public cloud's application data. Should this architecture be allowed?

Load More