cloud security

Cisco plugs WPA2 holes, critical Cloud Services Platform flaw
Cisco has released updates to address vulnerabilities in a wide variety of its products. Among these are updates fixing the WPA2 vulnerabilities that can be exploited in the …

Accenture inadvertently exposes highly sensitive corporate, client data online
Corporate consulting giant Accenture left bucketloads of sensitive corporate and client data exposed online for anyone to access. Luckily for them, it seems that UpGuard …

Hackers use organizations’ resources for stealthy cryptocurrency mining
Hackers lusting after cryptocurrency but not wanting to spend money to buy it or mine it are targeting users wallets, computers, popular Web sites and public cloud computing …

Standard cloud migration models are insufficient when moving mission critical workloads
Enterprises have found that standard cloud migration models are insufficient when moving mission critical workloads and require a specialized approach, according to a study …

Enterprise cloud adoption and IaaS security
Barracuda Networks and research firm Vanson Bourne polled 300 IT decision makers from organizations across the US on their use of public cloud Infrastructure as a Service …

Organizations are uncovering a cloud security paradox
The characteristics of modern applications in the cloud are changing, requiring software and IT architects to shift priorities. Businesses of all sizes are transforming in …

The security status quo falls short with born-in-the-cloud software
Born-in-the-cloud software, pioneered by companies like Salesforce, are beginning to dominate the computing landscape. According to Gartner, by 2020, the cloud shift will …

Complete and continuous cloud infrastructure protection
In this podcast recorded at Black Hat USA 2017, Hari Srinivasan, Director of Product Management at Qualys, talks about the challenges involved in securing clouds, and explains …

Unsecured Wi-Fi hotspots and troubling browsing behaviors
As adoption of cloud and mobile continues to rise, common employee practices inside and outside the workplace create risk for enterprises. To uncover the risks posed by users’ …

Understanding your responsibility and security in the cloud
In this podcast recorded at Black Hat USA 2017, Chris Drake, CEO at Armor, talks about the difference between security of the cloud and security in the cloud. Here’s a …

Where does corporate cloud security responsibility begin and service provider responsibility end?
Security has, is and will continue to be the cornerstone of advancement in the digital age. Conditions of trust, real or expected, are essential for digital economies to grow …

Malicious content delivered over SSL/TLS has more than doubled in six months
Threats using SSL encryption are on the rise. An average of 60 percent of the transactions in the Zscaler cloud have been delivered over SSL/TLS. Researchers also found that …
Featured news
Resources
Don't miss
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act
- When ransomware strikes, what’s your move?
- SafeLine Bot Management: Self-hosted alternative to Cloudflare
- Windows NTLM vulnerability exploited in multiple attack campaigns (CVE-2025-24054)