Cloud Security

Cloud Security | News, how-tos, features, reviews, and videos

network endpoint connections / synapses
storm clouds cloud computing cloud threat security lightning tormado by mdesigner125 getty

CSO > Conceptual image > Coventry University's cloud-first strategy

Coventry University puts security at the heart of its cloud-first strategy

The school goes cloud-first but aims to lead its sector when it comes to cybersecurity.

keeping the cloud secure cloud security lock padlock private cloud

How do you secure the cloud? New data points a way

New reports show big differences in risk among public, private and hybrid cloud deployments. Here’s advice on the tools, information and organizational structure needed to execute a successful cloud security strategy.

cubes - blocks - squares - containers - storage - repository

Review: How Aqua secures containers from development to production

The Aqua Cloud Native Security Platform uses an inherent advantage of containers, the fact that they are always highly specialized for their jobs, to create a cybersecurity structure based on whitelisting.

google cloud services

Google expands cloud security capabilities, including simpler configuration

New tools and services will help make it easier for enterprises to manage security with Google products as well as with Amazon and in their own private clouds and applications.

ai in biopharma 1000x630

Stakes of security especially high in pharmaceutical industry

Pharmaceutical companies face a special level of responsibility, as it is essential that consumers are able to trust in their prescription drugs and related medical treatments, and that patients are able to reliably access them while...

CSO Digital Magazine, Spring 2019

CSO50 2019: Seeding security in the cloud

CSO50 award-winning companies are rising to the cloud security challenge and finding new ways to protect data and assets.

10 cloud security breach virtualization wireless

A hacker or your cloud provider. Who presents the greatest risk to your data?

The latest threat to your data may not be a hacker, but your own cloud provider, who can suspend performance and hold your data hostage.

cloud security data breach crime accessible

SoftNAS Cloud 0day found: Upgrade ASAP

SoftNAS Cloud users should upgrade immediately following a report by Digital Defense that the virtual cloud appliance is vulnerable to a session management security issue.

red padlock cybersecurity threat ransomeware

The buzz at RSA 2019: Cloud security, network security, managed services and more

The buzz at RSA 2019 included talk about cybersecurity and business leaders coming together, managed services, cloud security, network security and more.

hot and cold fire and ice clash temperature

7 hot cybersecurity trends (and 4 going cold)

Is that security trend hot or not? From tools and technologies to threats, tactics, and training, the numbers don't lie.

cloud security ts

Multi-cloud security the next billion-dollar frontier

Constant change is the new normal. Success in today’s multi-cloud world requires greater adaptability and dynamic methods to protect digital identities and preserve trust.

RSA conference 2017

What to expect at the RSA Conference 2019

The RSA Conference will feature cloud-scale security analytics, endpoint security suites, API security, advanced security services, and a traffic jam of people.

rocket launch startup cloud success growth

12 of the hottest startups at the RSA Conference 2019

These RSAC Early Stage Expo startups bring fresh cybersecurity solutions to fight phishing, improve application security, provide better cloud protections, enforce security policy, more accurately authenticate and more.

IBM logo sign

IBM sets forth with a strong cybersecurity message

IBM has a strong cybersecurity message, but there's a gap between IBM security and its corporate vision. If IBM can bridge this gap, it can carve out a unique market position.

Cloud Security

CrowdStrike Store opens its endpoint security agent to other vendors

CrowdStrike will share data its cloud-based endpoint security platform collects to give customers more options while minimizing compatibility and performance concerns.

tools / toolkit

The problems plaguing security point tools

Security point tools generate too many alerts, create a strain on operational resources, and make security operations complex and time consuming, new ESG research shows.

10 cloud security breach virtualization wireless

Multi-vector attacks target cloud-hosted technologies

Securonix report outlines the threat posed by automated multi-vector, multi-platform attacks against cloud infrastructure.

10 cloud security breach virtualization wireless

How security operations centers are adapting to the cloud era

Moving data and processes to the cloud presents challenges for enterprise SOCs. Here's how the industry and business are finding new ways to collect, monitor and analyze cloud-based security data.

Load More
You Might Also Like