Cloud Security

Cloud Security news, analysis, research, how-to, opinion, and video.

cubes - blocks - squares - containers
data protection lock chain

Israel Barak
video

Honeypots and the evolution of botnets | Salted Hash Ep 23

Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm's recent honeypot research, which gathered information showing how the bot landscape is evolving.

abstract blockchain representation of blocks and nodes

Emerging blockchain-based distribution storage market and its effect on cloud computing

Until blockchain can produce an easily accessible, trustworthy model that clearly outshines cloud in security, it will be in catch-up mode.

cssh 013.00 22 53 39.still001
video

DJI's bounty problems and video surveillance programs | Salted Hash Ep 13

Host Steve Ragan unpacks the latest news about Chinese company DJI's bug bounty program, plus new developments in video surveillance and more, with Fahmida Rashid.

wide 2017.12.06 11.00.51.avi.11 21 57 57.still001
video

Zero Trust networks and enterprise security strategy | Salted Hash Ep 12

Executives at cloud services vendor Akamai -- David Lewis, global security advocate; Andy Ellis, CSO; and Charlie Gero, CTO -- talk with host Steve Ragan about the evolving role of security in the enterprise.

network security primary2

Warning: security vulnerabilities found in SD-WAN appliances

Our branch appliances are often exposed to “innocent” threats, such as being inadvertently disabled by third-party sales engineer. And even worse, they can be exposed to truly sensitive data.

Office 365 and OneDrive document sharing

Office 365: What’s your network deployment architecture?

Selecting the correct architecture for your Office 365 implementation affects whether your users have good performance or not. Here are some important tips to consider whether you are using SD-WAN or not.

data security

Microsoft launches data security technology for Windows Server, Azure

Microsoft's Azure confidential computing aims to protect data when it is being used, encrypting data while it is being manipulated.

fence cloud barrier chain link metal

8 steps to IT control in a self-service cloud world

How the “Minimum Viable Operating Model” (MVOM) allows IT to harness the cloud securely

large public cloud

7 reasons mid-size tech companies should reconsider going all-in on public cloud

From security to staffing, a hybrid model provides more flexibility for companies in growth mode.

data protection lock chain

The GDPR deadline is fast approaching; how enterprises are preparing

Follow these guidelines for the European Union General Data Protection Regulation (GDPR) for enterprises.

Keyboard
video

Tech Talk: The latest on Azure Stack, cyberattacks, the next iPhone and ... keyboards

Get the details on Microsoft's new Azure Stack, why cyberattacks never seem to end, the fate of Apple's Touch ID and why QWERTY keyboards are now tech relics.

Cloud_Security
video

Who's responsible for cloud security? | Tech Talk Pilot Episode, Pt 2

IDG editors talk about the common misperceptions about public cloud storage, including who's ultimately responsible for data security.

MS_Azure
video

What is Microsoft Azure Stack? | Tech Talk Pilot Episode, Pt 1

Learn the ins and outs of Microsoft's upcoming private cloud offering, Azure Stack, as editors discuss its expected benefits and drawbacks.

cloud security skywriting

Is protected health information safe in the cloud?

More healthcare providers are storing protected health information (PHI) in the cloud, and certain actions must be taken to secure it.

ransomware
Infographic

Stopping ransomware starts with the security pros

Bromium survey of security professionals shows lapses in their own best practices.

Alert Logic CEO Gray Hall

Security-as-a-service supplier Alert Logic started with IDS and blossomed from there

CEO Gray Hall shares insights into what customers are using, where the industry is going

chair spotlight

How CISOs can answer difficult questions from CEOs

A hypothetical conversation can become all too real, and hopefully you are prepared with the answers. Here is a script to help get you started.

karate training

Check Point boosts cloud-security education to help IT security pros stay relevant

Check Point is investing heavily in educating IT pros about the cloud, not only to promote their own cloud security products but to give potential customers the skills they’ll need to keep their jobs as their employers move more and...

Load More