Cloud Security

Cloud Security news, analysis, research, how-to, opinion, and video.

id management
keys ring of old antique keys stock

cloud question

What to think about when moving to the cloud

Thinking about making the idea of cloud a reality for today's enterprise

The era of identity-based applications

Enterprise organizations must elevate identity management beyond IT operations and make it an essential component of business processes and security.

01 intro container

6 questions to ask about containers

Lars Herrmann, general manager, Integrated Solutions Business Unit at Red Hat, poses six questions CISOs must ask when evaluating container platforms.

Cybersecurity Goes Private: McAfee and RSA

Good opportunities but challenges ahead for both companies

cloud building security

Implementing secure WANs in the cloud age

Over the past few years most organizations have significantly increased their reliance on the Internet, primarily due to the outsourcing of utility applications like email, unified communications, ERP, CRM, etc., to SaaS providers....

VMworld: My Cybersecurity-Centric Impressions

NSX security is gaining traction in the VMware installed based but the story remains confusing to cybersecurity professionals. VMware needs to bolster its NSX security go-to-market initiatives to scale to the next level

ermergency reponse siren

Best practices for incident response in the age of cloud

Having an incident response platform can help internal and external teams collaborate, track incident response processes and automate key security tasks

cloud computing data center

U.S. cloud vendors adjust to Snowden effect, Privacy Shield

AWS, Microsoft and Google are building data centers in Europe to address privacy concerns in a post-Snowden world. Cloud infrastructure revenue is rising, but how much better could be for U.S. vendors?

Cybersecurity and VMworld

What is VMware’s role in security and how is it impacting cybersecurity professionals and the industry? This week’s VMworld will tell the tale.

third party threats

5 security practices hackers say make their lives harder

Hackers believe no password is safe from a determined attacker, but they agree that five key security measures can make it a lot harder to penetrate enterprise networks.

life preserver

Data lakes security could use a life preserver

As big data initiatives gain steam at organizations, many companies are creating “data lakes” to provide a large number of users with access to the data they need. And as with almost every type of new IT initiative, this comes with a...

pixelated clouds reflecting on building windows

Experts challenge Skyhigh's patent for cloud-based encryption gateway

Skyhigh Networks, Inc., announced today that it has received a patent for using a hosted gateway to encrypt and decrypt data moving between users and cloud services such as Office 365, but some experts say that the technology new...

IDVector Pro USB

Startup IDVector anonymizes like Tor

A pair of former defense cyber security contractors is launching IDVector, a service that creates encrypted connections through an anonymizing network to shield users’ identities and locations and to protect their machines from...

risk reward ts

RiskSense lands $7M for assessment service

RiskSense, software-as-a-service that evaluates the security of corporate networks and generates a risk score, has been self-financed since its launch last year, but now has harnessed venture funding to help boost its R&D and hire...

New features in Windows 10 laptop

Respect: Windows 10 security impresses hackers

Windows is a popular attack target for criminals and researchers alike, but Microsoft has done a good job of making it harder to target security flaws in the OS

used car salesman

Do you trust your cloud provider? Addressing these questions will help put you at ease

Focus on security, privacy and operations

cloud security
Clear Choice Tests

CASB delivers must-have protection for your SaaS apps

NetSkope edges CipherCloud and Bitglass in test of three ingenious and powerful cloud access security brokers.

cloud security decisions
Clear Choice Tests

What is a cloud access security broker and why do I need one?

CASB products provide a variety of security measures, including access control, firewall, identity management, anti-malware, DLP, encryption and threat management. So, what are the basic use cases for CASB?

Load More