Cloud Security

Cloud Security | News, how-tos, features, reviews, and videos

digital security concept > lock / keyhole / circuits / network connections

The transition toward enterprise-class cybersecurity vendors

Information security professionals working at enterprise organizations want to work with vendors that have experience with business/IT initiatives and industry knowledge.

forensics threat hunter cyber security thumbprint

What your enterprise needs to know about cyber threat intelligence

Understanding the threats and vulnerabilities in your IT environment.

cloud security lock

Arista Networks PICs its spot In security

After establishing itself as an innovative network vendor, Arista has moved into the security market, addressing the challenges of 'places in cloud.'

10 cloud security breach virtualization wireless

What are Amazon Zelkova and Tiros? AWS looks to reduce S3 configuration errors

Amazon’s latest tools help identify where data might be left exposed in your AWS S3 cloud environments.

gdpr

The unintended consequences of GDPR

This is not what the regulators had in mind. Business leaders, ignore at your own peril.

Black Hat logo with woman in silhouette

Take-aways from Black Hat USA 2018

Black Hat USA 2018 had record crowds, revealed a growing attack surface, and proved we have lots of work ahead.

Audience at Black Hat Conference

Anticipating Black Hat USA 2018

Looking forward to learning more about new developments in artificial intelligence, cloud security, enterprise risk management, and lots of other topics

mobile phone payment

What’s next in payment security?

The three fundamental changes that every card-accepting business and payment solution provider must know.

vulnerable virus breach hacked cyber attack

Reddit discloses hack, says SMS intercept allowed attackers to skirt 2FA protections

Reddit, one of the largest websites on the internet, announced on Wednesday that someone was able to compromise staff accounts at their cloud and source code hosting providers, leaving backups, source code, and various logs exposed.

cloud computing - connections - apps - network

Securing continuous deployment for applications in the cloud

Container orchestration tools lack the necessary security controls but attribute based access control (ABAC) can help.

google cloud services

Google intends to make GCP the most secure cloud platform

If Google wants the world to know how secure Google Cloud Platform is and increase adoption, it must educate the market and turn up the competitive fire.

cloud security ts

How do you secure the cloud? New data points a way

New reports show big differences in risk among public, private, and hybrid cloud deployments. Here’s advice on the tools, information, and organizational structure needed to execute a successful cloud security strategy.

abstract image of business silhouettes in blurred motion

The best way to connect with a distracted and time-crunched security buyer

These four techniques will help you rise above the noise – warning some of it may be uncomfortable.

network security locks and cables

What I learned at Tufin's customer conference (Tufinnovate)

Massive network security changes, cloud adoption, and a pressing need for network security process automation were among the things discussed at Tufin's customer conference.

eye binary IDS Intrusion Detection System

Cybersecurity operations: Don't wait for the alert

An SOC is a useful part of our cybersecurity arsenal, but its main benefit will be in helping to minimize damage from an issue that has already happened. A strong investigative team, on the other hand, can help to identify and resolve...

blockchain links

How are small businesses adopting blockchain technology?

How and why small businesses are taking advantage of blockchain technology to improve their business models – from their cloud storage to their payment methods.

emerging tech ai machine learning

Security and new technology: How one company faced the unknown

A move to a pure cloud strategy at the London Stock Exchange Group forced a new security mindset. Here's how the LSEG's CISO faced the challenge.

file folder storage and sharing

How cloud storage solutions are evolving to fight hackers

Decentralized cloud services are disrupting the industry, increasing security and more. Here's how these companies are looking to the future and designing a new breed of storage solutions: decentralized, blockchain-backed cloud...

4 encryption keys

Hardware, software options emerge for runtime encryption

Hackers are getting better at exploiting encryption gaps that expose plain-text data. New hardware and software runtime encryption solutions aim to close those gaps.

cisco logo sign

Cisco poised to become a cybersecurity force

Cisco's cybersecurity strategy focuses on product integration, an open platform, and simplifying operations for its customers. But it must do more to capture the attention of information security professionals.

Load More