Cloud Security

Cloud Security | News, how-tos, features, reviews, and videos

cubes - blocks - squares - containers - storage - repository

Review: How Aqua secures containers from development to production

The Aqua Cloud Native Security Platform uses an inherent advantage of containers, the fact that they are always highly specialized for their jobs, to create a cybersecurity structure based on whitelisting.

google cloud services

Google expands cloud security capabilities, including simpler configuration

New tools and services will help make it easier for enterprises to manage security with Google products as well as with Amazon and in their own private clouds and applications.

ai in biopharma 1000x630

Stakes of security especially high in pharmaceutical industry

Pharmaceutical companies face a special level of responsibility, as it is essential that consumers are able to trust in their prescription drugs and related medical treatments, and that patients are able to reliably access them while...

CSO Digital Magazine, Spring 2019

CSO50 2019: Seeding security in the cloud

CSO50 award-winning companies are rising to the cloud security challenge and finding new ways to protect data and assets.

10 cloud security breach virtualization wireless

A hacker or your cloud provider. Who presents the greatest risk to your data?

The latest threat to your data may not be a hacker, but your own cloud provider, who can suspend performance and hold your data hostage.

cloud security data breach crime accessible

SoftNAS Cloud 0day found: Upgrade ASAP

SoftNAS Cloud users should upgrade immediately following a report by Digital Defense that the virtual cloud appliance is vulnerable to a session management security issue.

red padlock cybersecurity threat ransomeware

The buzz at RSA 2019: Cloud security, network security, managed services and more

The buzz at RSA 2019 included talk about cybersecurity and business leaders coming together, managed services, cloud security, network security and more.

hot and cold fire and ice clash temperature

7 hot cybersecurity trends (and 4 going cold)

Is that security trend hot or not? From tools and technologies to threats, tactics, and training, the numbers don't lie.

cloud security ts

Multi-cloud security the next billion-dollar frontier

Constant change is the new normal. Success in today’s multi-cloud world requires greater adaptability and dynamic methods to protect digital identities and preserve trust.

RSA conference 2017

What to expect at the RSA Conference 2019

The RSA Conference will feature cloud-scale security analytics, endpoint security suites, API security, advanced security services, and a traffic jam of people.

rocket launch startup cloud success growth

12 of the hottest startups at the RSA Conference 2019

These RSAC Early Stage Expo startups bring fresh cybersecurity solutions to fight phishing, improve application security, provide better cloud protections, enforce security policy, more accurately authenticate and more.

IBM logo sign

IBM sets forth with a strong cybersecurity message

IBM has a strong cybersecurity message, but there's a gap between IBM security and its corporate vision. If IBM can bridge this gap, it can carve out a unique market position.

Cloud Security

CrowdStrike Store opens its endpoint security agent to other vendors

CrowdStrike will share data its cloud-based endpoint security platform collects to give customers more options while minimizing compatibility and performance concerns.

tools / toolkit

The problems plaguing security point tools

Security point tools generate too many alerts, create a strain on operational resources, and make security operations complex and time consuming, new ESG research shows.

10 cloud security breach virtualization wireless

Multi-vector attacks target cloud-hosted technologies

Securonix report outlines the threat posed by automated multi-vector, multi-platform attacks against cloud infrastructure.

10 cloud security breach virtualization wireless

How security operations centers are adapting to the cloud era

Moving data and processes to the cloud presents challenges for enterprise SOCs. Here's how the industry and business are finding new ways to collect, monitor and analyze cloud-based security data.

cloud security

Review: How StackRox protects containers

StackRox fully integrates with Kubernetes so that it touches all three phases of containerization deployment: the building of the containers, the deployment of them into the cloud infrastructure, and finally the running of those...

Statue of Atlas against a blue sky and large white clouds.

Review: Protecting multi-cloud environments with Threat Stack

Because it's intended for use in environments that require constant uptime, Threat Stack simply concentrates on the detection aspect of cybersecurity, alerting admins when suspicious activity is spotted.

cyber resilience shock absorber

Taking a moment to appreciate how far we’ve come

There is unprecedented responsibility on enterprises leaders and their security teams to create a culture of security and instill organizational cyber resilience.

robot monitoringa  cog wheel system for maintenance [automation]

Automating security at AWS: How Amazon Web Services operates with no SOC

Amazon Web Services CISO Stephen Schmidt explains the company's recipe for combining security automation with ways to get management and staff to take security seriously.

Load More