Cloud Security

Cloud Security | News, how-tos, features, reviews, and videos

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall

Rowhammer memory attacks close in on the real world

This theoretical security problem is becoming all too real. Expect to see a major Rowhammer security exploit within the next year as attackers tap GPUs, FPGAs and more to accelerate the process. Here's how to protect yourself.

CSO Executive Sessions [podcast logo]

Episode 7: Security in a time of crisis

Podcast Episode 7: Listen now as Christopher Burgess, a writer and speaker on security issues and former senior security adviser to Cisco, discusses the risk from the scramble to move to remote work at scale.

A business man touches a futuristic lock + circuit board security interface.

5 standout products from RSA 2020

2020 will be remembered as the year the human element finally came to security.

cloud security / data protection / encryption / security transition

Infrastructure-as-code templates are the source of many cloud infrastructure weaknesses

A new report shows a high percentage of IaC template misconfigurations in cloud deployments that leave them vulnerable to attack.

Multiple individual cloud instances / cloud deployments

How Adobe monitors cloud deployments to control shadow IT

Keeping an eye on your cloud deployments is key to preventing yet another data breach. Adobe's MAVLink program does just that.

multicloud

Why multicloud security is your next big challenge

Companies deploy an average of three to five different cloud services. With an increased emphasis on security and regulatory compliance, the capability to manage these disparate systems is crucial.

security posture / cybersecurity landscape / binary eye / locks / keyholes / firewall / gears

5 ways to improve your security posture in 2020

What will shape the cybersecurity conversation in 2020? Only time will tell, but following these five trends will help you rise to new challenges.

cloud network assets / cryptocurrency / IoT / disruptive technologies / digital transformation

Review: How Fugue protects cloud assets

The Fugue platform fills a critical need, bringing infrastructure and security compliance protection to the cloud.

keeping the cloud secure cloud security lock padlock private cloud

Review: How DivvyCloud protects cloud deployments

Keep your cloud instances in compliance throughout their lifecycle — regardless of the type of cloud, the technology or the vendor.

data / analytics / trends

5 security operations and analytics trends to watch in 2020

Look for more integration, an increasing focus on risk management, and greater use of the public cloud.

cloud security lock

3 cloud security ‘hacks’ to consider today

Keeping your cloud deployments secure is a full-time job. Here are a few shortcuts that make your cloud security better and your life easier

cloud security shield with checkmark / cloud / digital connections / cloud security expert / CASB

How to evaluate a CASB

All cloud access security brokers share core functionality, but they deliver it differently and they all have unique feature sets. Here's what you need to know before buying one.

boxes box idea outside the box it as a product surprise unique masterzphotois getty

Review: How NeuVector protects containers throughout their lifecycle

Most traditional security products have very little visibility into containers running in the cloud. NeuVector protects containers from within the containerized environment.

business travel / airport terminal walkway / traveller

What you need to know about new data-security rules for business travel

From U.S. Customs agents to cybercriminals, everyone wants to copy the data on your phone and laptop. Here’s how to protect your rights and also avoid industrial espionage.

protected key within a secured network

4 big changes coming to cybersecurity in 2020 and beyond

The pace of technology and market changes will pick up in 2020, impacting security technologies, innovation, investment, and the industry at large.

CSO > cloud computing / backups / data center / server racks / data transfer

5 cloud security basics and best practices

Companies that move to the cloud have to assume new responsibilities, develop new skill sets and implement new processes. The first step to better cloud security is to assume you have no security.

Gears in the form of a cloud in a binary field  >  Cloud controls

7 cloud security controls you should be using

Human error is one of the top reasons for data breaches in the cloud, as administrators forget to turn on basic security controls. Whether it is Amazon Web Services, Microsoft Azure, or Google Cloud Platform, keep these rules in mind...

Cloud Security

Cloud security: Inside the shared responsibility model

The Capital One security fiasco has underlined that securing the cloud is both a complicated technology and contractual problem.

vmware vmworld sharpen focus

Can VMware become a leading cybersecurity vendor?

VMware's recent acquisition of Carbon Black gives the company a strong security foundation to build on.

Let's Encrypt automated encryption gears

Black Hat 2019: 3 cybersecurity concerns and 3 things that give hope

At this year's Black Hat, it was evident that several cybersecurity issues remain a concern, but the industry is making progress.

Load More
You Might Also Like