Cloud Security

Cloud Security | News, how-tos, features, reviews, and videos

number 4 four film strip
data loss running water faucet costly mistake waste

cubes - blocks - squares - containers - storage - repository

Container security: crafting application identity

Containers are not like traditional workloads and as a result, they require a new security model. Traditional methods such as IP address and ACLs are no longer effective.

data protection lock chain

Protecting data in a hybrid cloud environment

In an era when ‘data is the new oil,’ protecting your business’ data is a critical element of your storage strategy. Here’s how you can keep your customers’ information – and your own business – safe and sound.

Israel Barak
video

Honeypots and the evolution of botnets | Salted Hash Ep 23

Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm's recent honeypot research, which gathered information showing how the bot landscape is evolving.

abstract blockchain representation of blocks and nodes

Emerging blockchain-based distribution storage market and its effect on cloud computing

Until blockchain can produce an easily accessible, trustworthy model that clearly outshines cloud in security, it will be in catch-up mode.

cssh 013.00 22 53 39.still001
video

DJI's bounty problems and video surveillance programs | Salted Hash Ep 13

Host Steve Ragan unpacks the latest news about Chinese company DJI's bug bounty program, plus new developments in video surveillance and more, with Fahmida Rashid.

wide 2017.12.06 11.00.51.avi.11 21 57 57.still001
video

Zero Trust networks and enterprise security strategy | Salted Hash Ep 12

Executives at cloud services vendor Akamai -- David Lewis, global security advocate; Andy Ellis, CSO; and Charlie Gero, CTO -- talk with host Steve Ragan about the evolving role of security in the enterprise.

network security primary2

Warning: security vulnerabilities found in SD-WAN appliances

Our branch appliances are often exposed to “innocent” threats, such as being inadvertently disabled by third-party sales engineer. And even worse, they can be exposed to truly sensitive data.

Office 365 and OneDrive document sharing

Office 365: What’s your network deployment architecture?

Selecting the correct architecture for your Office 365 implementation affects whether your users have good performance or not. Here are some important tips to consider whether you are using SD-WAN or not.

data security

Microsoft launches data security technology for Windows Server, Azure

Microsoft's Azure confidential computing aims to protect data when it is being used, encrypting data while it is being manipulated.

fence cloud barrier chain link metal

8 steps to IT control in a self-service cloud world

How the “Minimum Viable Operating Model” (MVOM) allows IT to harness the cloud securely

large public cloud

7 reasons mid-size tech companies should reconsider going all-in on public cloud

From security to staffing, a hybrid model provides more flexibility for companies in growth mode.

data protection lock chain

The GDPR deadline is fast approaching; how enterprises are preparing

Follow these guidelines for the European Union General Data Protection Regulation (GDPR) for enterprises.

Keyboard
video

Tech Talk: The latest on Azure Stack, cyberattacks, the next iPhone and ... keyboards

Get the details on Microsoft's new Azure Stack, why cyberattacks never seem to end, the fate of Apple's Touch ID and why QWERTY keyboards are now tech relics.

Cloud_Security
video

Who's responsible for cloud security? | Tech Talk Pilot Episode, Pt 2

IDG editors talk about the common misperceptions about public cloud storage, including who's ultimately responsible for data security.

MS_Azure
video

What is Microsoft Azure Stack? | Tech Talk Pilot Episode, Pt 1

Learn the ins and outs of Microsoft's upcoming private cloud offering, Azure Stack, as editors discuss its expected benefits and drawbacks.

cloud security skywriting

Is protected health information safe in the cloud?

More healthcare providers are storing protected health information (PHI) in the cloud, and certain actions must be taken to secure it.

ransomware
Infographic

Stopping ransomware starts with the security pros

Bromium survey of security professionals shows lapses in their own best practices.

Alert Logic CEO Gray Hall

Security-as-a-service supplier Alert Logic started with IDS and blossomed from there

CEO Gray Hall shares insights into what customers are using, where the industry is going

Load More