Cloud Security

Cloud Security news, analysis, research, how-to, opinion, and video.

puzzle solution / key / unlocking success

Splunk's position on SOAPA – Part 1

Splunk's senior vice president of security markets, Haiyan Song, talks about security technology integration, Splunk’s strategy and customer benefits.


cloud security skywriting

Is protected health information safe in the cloud?

More healthcare providers are storing protected health information (PHI) in the cloud, and certain actions must be taken to secure it.

ransomware
Infographic

Stopping ransomware starts with the security pros

Bromium survey of security professionals shows lapses in their own best practices.

Alert Logic CEO Gray Hall

Security-as-a-service supplier Alert Logic started with IDS and blossomed from there

CEO Gray Hall shares insights into what customers are using, where the industry is going

chair spotlight

How CISOs can answer difficult questions from CEOs

A hypothetical conversation can become all too real, and hopefully you are prepared with the answers. Here is a script to help get you started.

SIEM remains an enterprise security architecture requirement

Enterprise-class cybersecurity technology vendors must offer SIEM software, security analytics, and operations capabilities or have strong SIEM partners.

karate training

Check Point boosts cloud-security education to help IT security pros stay relevant

Check Point is investing heavily in educating IT pros about the cloud, not only to promote their own cloud security products but to give potential customers the skills they’ll need to keep their jobs as their employers move more and...

The rise of enterprise-class cybersecurity vendors

Cybersecurity professionals say enterprise-class cybersecurity vendors must offer industry experience, support for IT initiatives and a commitment to streamline security operations.

cloud security

Cloud security startup RedLock automates public-cloud protection

Cloud security startup RedLock comes out of stealth mode today with a service that helps defend business resources that reside in pubic clouds, gives customers visibility into how these resources are being used and stores records of...

Are next-generation firewalls legacy technology?

While network firewalls continue to anchor security, requirements are changing and next-generation firewall (NGFW) functionality is migrating elsewhere.

door lock key

Barracuda protects industrial IoT with network-based firewall

Industrial IoT systems using open communication protocols may be vulnerable to attacks through TCP Port 502. Barracuda's NextGen Firewalls can help protect against that.

The move toward enterprise security technology integration

Enterprises want best-of-breed security technology and integration. They'd buy from enterprise-class cybersecurity vendors—if they knew who they were.

security as service 2

Security-as-a-service model gains traction

A new report finds mid-tier companies are increasingly turning to security-as-a-service offerings to manage their network security needs.

Cybersecurity skills shortage impact on technology innovation

The global cybersecurity skills shortage demands that new cybersecurity technologies must be built for ease of deployment, ease of use, and rapid ROI.

Cybersecurity skills shortage threatens the mid-market

Organizations with 100 to 999 employees remain understaffed and under-skilled in cybersecurity—and an easy mark for hackers.

cloud security

Finding and protecting the crown jewels

Layer 7 visibility and stateful application controls are important aspects of cloud security—protecting business-critical applications and data.

Cybersecurity remains an elusive business priority

Most organizations are increasing cybersecurity spending and elevating cybersecurity issues to the board level but still struggle with the cybersecurity skills shortage.

SOAPA services opportunities abound

Similar to the rise of ERP in the 1990s, we are about to see a cybersecurity services boom around Security Operations and Analytics (SOAPA).

People, process and technology challenges with security operations

Large organizations need to focus on formalizing processes, implementing intelligent security technologies, training staff and modifying the organization.

Load More