Please turn on your JavaScript for this page to function normally.
Cisco
Cisco plugs WPA2 holes, critical Cloud Services Platform flaw

Cisco has released updates to address vulnerabilities in a wide variety of its products. Among these are updates fixing the WPA2 vulnerabilities that can be exploited in the …

Accenture
Accenture inadvertently exposes highly sensitive corporate, client data online

Corporate consulting giant Accenture left bucketloads of sensitive corporate and client data exposed online for anyone to access. Luckily for them, it seems that UpGuard …

bitcoin
Hackers use organizations’ resources for stealthy cryptocurrency mining

Hackers lusting after cryptocurrency but not wanting to spend money to buy it or mine it are targeting users wallets, computers, popular Web sites and public cloud computing …

cloud migration
Standard cloud migration models are insufficient when moving mission critical workloads

Enterprises have found that standard cloud migration models are insufficient when moving mission critical workloads and require a specialized approach, according to a study …

corporate cloud
Enterprise cloud adoption and IaaS security

Barracuda Networks and research firm Vanson Bourne polled 300 IT decision makers from organizations across the US on their use of public cloud Infrastructure as a Service …

cloud proliferation
Organizations are uncovering a cloud security paradox

The characteristics of modern applications in the cloud are changing, requiring software and IT architects to shift priorities. Businesses of all sizes are transforming in …

cloud computing
The security status quo falls short with born-in-the-cloud software

Born-in-the-cloud software, pioneered by companies like Salesforce, are beginning to dominate the computing landscape. According to Gartner, by 2020, the cloud shift will …

cloud
Complete and continuous cloud infrastructure protection

In this podcast recorded at Black Hat USA 2017, Hari Srinivasan, Director of Product Management at Qualys, talks about the challenges involved in securing clouds, and explains …

Wi-Fi
Unsecured Wi-Fi hotspots and troubling browsing behaviors

As adoption of cloud and mobile continues to rise, common employee practices inside and outside the workplace create risk for enterprises. To uncover the risks posed by users’ …

cloud
Understanding your responsibility and security in the cloud

In this podcast recorded at Black Hat USA 2017, Chris Drake, CEO at Armor, talks about the difference between security of the cloud and security in the cloud. Here’s a …

cloud
Where does corporate cloud security responsibility begin and service provider responsibility end?

Security has, is and will continue to be the cornerstone of advancement in the digital age. Conditions of trust, real or expected, are essential for digital economies to grow …

lock
Malicious content delivered over SSL/TLS has more than doubled in six months

Threats using SSL encryption are on the rise. An average of 60 percent of the transactions in the Zscaler cloud have been delivered over SSL/TLS. Researchers also found that …

Don't miss

Cybersecurity news