
Orchestrating security across multiple environments
In an effort to help organizations centralize their intelligence and security process management, ThreatConnect has expanded its security platform’s capabilities to …

Use Chaos Monkey to push engineers to build resilient cloud services
Netflix’s engineering team is good at sharing the tools they create, and keeping them updated to serve different needs. Chaos Monkey is the latest offering that received …

WinMagic provides encryption of virtual machines running on IaaS platforms
At RSA Conference 2016 WinMagic introduced security software that encrypts virtual machines running on Infrastructure as a Service (IaaS) platforms. Addressing the growing …

Qualys extends Cloud Agent Platform to support Linux and Mac OS
Qualys announced the expansion of the Qualys Cloud Agent Platform. The Cloud Agent platform empowers organizations with flexibility and real-time asset inventory searches on a …

Employee and HR data is the most commonly encrypted data
The use of encryption continues to grow in response to cyber-attacks, privacy compliance regulations and consumer concerns, and the majority of organizations plan to transfer …

Video: Trust in the Cloud panel
Here is video recording of a “Trust in the Cloud” panel which was a part of the Rackspace::Solve NYC event held last Thursday. Rackspace Security leader David …

IT use of cloud surges to record heights
The cloud has reached the point where businesses are no longer debating whether or not to use cloud, but how pervasively they will use it. A new North Bridge survey shows …

Rackspace CSO on security: It’s time to go back to the fundamentals
Although less sexy, it is time to get back to the fundamentals. And it is this call to action that forms the basis of my 2016 predictions. Simplify and streamline security: …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility