Cloud Security

Cloud Security | News, how-tos, features, reviews, and videos

cloud computing - connections - apps - network

Securing continuous deployment for applications in the cloud

Container orchestration tools lack the necessary security controls but attribute based access control (ABAC) can help.

google cloud services

Google intends to make GCP the most secure cloud platform

If Google wants the world to know how secure Google Cloud Platform is and increase adoption, it must educate the market and turn up the competitive fire.

cloud security ts

How do you secure the cloud? New data points a way

New reports show big differences in risk among public, private, and hybrid cloud deployments. Here’s advice on the tools, information, and organizational structure needed to execute a successful cloud security strategy.

abstract image of business silhouettes in blurred motion

The best way to connect with a distracted and time-crunched security buyer

These four techniques will help you rise above the noise – warning some of it may be uncomfortable.

network security locks and cables

What I learned at Tufin's customer conference (Tufinnovate)

Massive network security changes, cloud adoption, and a pressing need for network security process automation were among the things discussed at Tufin's customer conference.

eye binary IDS Intrusion Detection System

Cybersecurity operations: Don't wait for the alert

An SOC is a useful part of our cybersecurity arsenal, but its main benefit will be in helping to minimize damage from an issue that has already happened. A strong investigative team, on the other hand, can help to identify and resolve...

blockchain links

How are small businesses adopting blockchain technology?

How and why small businesses are taking advantage of blockchain technology to improve their business models – from their cloud storage to their payment methods.

emerging tech ai machine learning

Security and new technology: How one company faced the unknown

A move to a pure cloud strategy at the London Stock Exchange Group forced a new security mindset. Here's how the LSEG's CISO faced the challenge.

file folder storage and sharing

How cloud storage solutions are evolving to fight hackers

Decentralized cloud services are disrupting the industry, increasing security and more. Here's how these companies are looking to the future and designing a new breed of storage solutions: decentralized, blockchain-backed cloud...

4 encryption keys

Hardware, software options emerge for runtime encryption

Hackers are getting better at exploiting encryption gaps that expose plain-text data. New hardware and software runtime encryption solutions aim to close those gaps.

cisco logo sign

Cisco poised to become a cybersecurity force

Cisco's cybersecurity strategy focuses on product integration, an open platform, and simplifying operations for its customers. But it must do more to capture the attention of information security professionals.

cloud security

What is a CASB? What you need to know before you buy

Cloud access security brokers have come a long way in a few years and can be an effective way to manage authentication and encryption across cloud and on-premise systems.

medical x ray imaging hands

X-ray your SaaS apps to reveal hidden security vulnerabilities

Best practices to understand security evaluations what is happening "under the hood" of cloud/SaaS applications.

network security locks and cables

Moving to central network security policy management for hybrid clouds

With controls built into the infrastructure, the industry is headed toward central network security policy management (and reporting).

cloud apps

Cloud functions present new security challenges

Cloud functions, or serverless apps, are small, fast and pop in and out of existence. So, how do you secure them?

blue padlock in circle pixels digital security padlock

The rise of analyst-centric security operations technologies

The shift of technology to meet analyst needs has altered the infosec market -- for the better.

symantec banner

Symantec in a position to progress and prosper

Symantec has some internal challenges and increased competition, but it appears to be facing these challenges from a position of strength in the market.

tools drill bits toolkit tookapic free cc0 via pexels binary thinkstock

24 best free security tools

Check out these 24 free, standout software tools that will make your daily security work easier.

24 best free security tools

Check out these 24 free, standout software tools that will make your daily security work easier.

binary cyberattack cybersecurity hacked protected

End-to-end security requires multi-vendor automation

To make it easier to use security tools from multiple vendors, as well as bake security into the development process, Fortinet introduces Fabric Connectors and DevOps integration.

Load More