Cloud Security

Cloud Security news, analysis, research, how-to, opinion, and video.

security as service 2

Cybersecurity skills shortage impact on technology innovation

The global cybersecurity skills shortage demands that new cybersecurity technologies must be built for ease of deployment, ease of use, and rapid ROI.


Cybersecurity skills shortage threatens the mid-market

Organizations with 100 to 999 employees remain understaffed and under-skilled in cybersecurity—and an easy mark for hackers.

cloud security

Finding and protecting the crown jewels

Layer 7 visibility and stateful application controls are important aspects of cloud security—protecting business-critical applications and data.

Cybersecurity remains an elusive business priority

Most organizations are increasing cybersecurity spending and elevating cybersecurity issues to the board level but still struggle with the cybersecurity skills shortage.

SOAPA services opportunities abound

Similar to the rise of ERP in the 1990s, we are about to see a cybersecurity services boom around Security Operations and Analytics (SOAPA).

People, process and technology challenges with security operations

Large organizations need to focus on formalizing processes, implementing intelligent security technologies, training staff and modifying the organization.

The 'new' McAfee

Security veteran McAfee has ample opportunity to prosper again with the right investment and focus.

mit anonymity Riffle privacy

Data security and the cloud: Earn trust by putting your customers in control

Giving customers control over who can access their sensitive data can go a long way toward helping the cloud industry reduce fears and earn trust.

cloud security

The evolution of data center segmentation

Micro-segmentation, an evolution of network security, lets organizations add granular segmentation policies to their data center transformation strategy.

internet security privacy

Information security in an insecure world

A guide for current and aspiring CTOs about the process of securing your data and platforms and receiving security certification

information security threat primary4

9 biggest information security threats through 2019

Each year, the Information Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its 'Threat Horizon' report to provide a forward-looking view of the biggest security...

cloud security

7 best practices for securing your cloud service

Learn how to securely leverage the benefits of the cloud by using its strengths to overcome issues that have traditionally been labeled as weaknesses.

cloud security skywriting

Cloud security still a work in progress

Cybersecurity professionals admit that they still don’t have the right skills, processes and monitoring capabilities for cloud security. Suggestions?

apple data centers company tech news

Expert: Apple may have deployed unauthorized patch by mistake

Last month, reports came out that Apple accidentally installed a fake firmware patch on internal development servers. That's a lesson to all companies to be careful about where they get their patches.

disaster recovery button

Disaster recovery: How is your business set up to survive an outage?

Can your business get by with an asynchronous backup or must that offsite server be updated by the second to keep the business up and running at all times.

cloud security

Google tries to beat AWS at cloud security

New tools that protect enterprise applications running on Google Cloud Platform may help take the spotlight away from AWS and Microsoft Azure

062216blog trojan horse

Danes targeted by malware spread through Dropbox

Earlier this week, Danish-speaking users were hit by malware spread through Dropbox, but the company responded quickly to shut down the attack

How to achieve security via whitelisting with Docker containers  

Twistlock has developed techniques that effectively provide whitelisting to Docker containers

Security alert overload threatens to bury security teams

Enterprises can’t keep up with security alert volume, struggle to prioritize the right alerts and ignore a large percentage of the security alert total. They need help!

Load More