Cloud Security

Cloud Security | News, how-tos, features, reviews, and videos

ibm cloud lab
ipv6 casb cloud access broker secured public cloud

abstract data

How blockchain will manage networks

Ethernet networking technology is inherently insecure and hard to manage. To address that, researchers say a blockchain approach to network management is needed.

cloud connect comput woman carry lights

SD-WAN can help solve challenges of multi-cloud

Cooperation between SD-WAN vendors and cloud service providers contributes to easily managed cloud connections across multiple cloud providers and creates a secure, low-latency multi-cloud environment.

number 4 four film strip

4 ways to avoid cloud outages and improve system performance

Cloud providers can fall victim to outages just like anyone else. Here are some straightforward steps you can take to keep IT systems up, running and secure.

data loss running water faucet costly mistake waste

Skimping on business data protection could be a costly mistake

A look at the importance of rapid data recoverability and high availability to mitigate the potentially negative business impact of taking shortcuts and relying on cloud partners too much.

cubes - blocks - squares - containers - storage - repository

Container security: crafting application identity

Containers are not like traditional workloads and as a result, they require a new security model. Traditional methods such as IP address and ACLs are no longer effective.

data protection lock chain

Protecting data in a hybrid cloud environment

In an era when ‘data is the new oil,’ protecting your business’ data is a critical element of your storage strategy. Here’s how you can keep your customers’ information – and your own business – safe and sound.

Israel Barak
video

Honeypots and the evolution of botnets | Salted Hash Ep 23

Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm's recent honeypot research, which gathered information showing how the bot landscape is evolving.

abstract blockchain representation of blocks and nodes

Emerging blockchain-based distribution storage market and its effect on cloud computing

Until blockchain can produce an easily accessible, trustworthy model that clearly outshines cloud in security, it will be in catch-up mode.

cssh 013.00 22 53 39.still001
video

DJI's bounty problems and video surveillance programs | Salted Hash Ep 13

Host Steve Ragan unpacks the latest news about Chinese company DJI's bug bounty program, plus new developments in video surveillance and more, with Fahmida Rashid.

wide 2017.12.06 11.00.51.avi.11 21 57 57.still001
video

Zero Trust networks and enterprise security strategy | Salted Hash Ep 12

Executives at cloud services vendor Akamai -- David Lewis, global security advocate; Andy Ellis, CSO; and Charlie Gero, CTO -- talk with host Steve Ragan about the evolving role of security in the enterprise.

network security primary2

Warning: security vulnerabilities found in SD-WAN appliances

Our branch appliances are often exposed to “innocent” threats, such as being inadvertently disabled by third-party sales engineer. And even worse, they can be exposed to truly sensitive data.

Office 365 and OneDrive document sharing

Office 365: What’s your network deployment architecture?

Selecting the correct architecture for your Office 365 implementation affects whether your users have good performance or not. Here are some important tips to consider whether you are using SD-WAN or not.

data security

Microsoft launches data security technology for Windows Server, Azure

Microsoft's Azure confidential computing aims to protect data when it is being used, encrypting data while it is being manipulated.

Load More