Please turn on your JavaScript for this page to function normally.
Money
Security spending rises in areas ineffective against multi-stage attacks

Vormetric announced the results of the Financial Services Edition of the 2016 Vormetric Data Threat Report (DTR). This edition extends earlier findings of the global report, …

Desk
Compromised credentials still to blame for many data breaches

Compromised credentials are still the cause of almost a quarter of all data breaches, according to the Cloud Security Alliance (CSA). Data breaches, account hijacking and …

bomb
Short URLs plus cloud services equal bad security

Short URLs are great when they lead to public websites, and documents and files that aren’t meant to remain private, but you should think twice about using them to lead …

cloud binary
Trust is the key to cloud adoption

Intel Security released a global report advocating the need for technology vendors to help businesses, governments and consumers understand the implications surrounding …

Netwrix
Netwrix Auditor 8.0: Visibility into hybrid cloud IT infrastructures

Netwrix released Netwrix Auditor 8.0. The new version of the IT auditing platform simplifies detection of security threats and enables organizations to gain control over …

cloud computing
Attacks are driving cloud security market growth

The global cloud security market is expected to grow at a CAGR of over 20% until 2019, according to Technavio. “A key reason for the adoption of cloud security is the sudden …

server
The state of the cloud and the Software-Defined Data Center

We’ve long been moving toward cloud-based and virtualized infrastructures, but in some ways 2016 might just be the year in which the Software-Defined Data Center (SDDC) really …

cables
Network security operations becoming more difficult

One hundred and fifty enterprise IT security professionals from a wide range of industries were surveyed by Enterprise Strategy Group (ESG) to gain a better understanding of …

5 key questions to determine your security posture

To understand any businesses’ security posture, one must first understand the eight categories of cybersecurity that is impacted: security intelligence, fraud, people, …

cloud binary
Cloud Status: Free app for cloud infrastructure monitoring

Server Density released a new free iOS app that enables you to stay up to date with the service status from key cloud providers. The Cloud Status app sends you notifications …

trend micro cloud app security
Trend Micro Cloud App Security integrates with Box, Dropbox and Google Drive

Trend Micro announced the expansion of its Cloud App Security at the RSA Conference. Cloud App Security enhances cloud file sharing and collaboration services and Microsoft …

cloud threats
Top 12 cloud computing threats in 2016

The Cloud Security Alliance (CSA) Top Threats Working Group released at RSA Conference an important new research report about cloud computing threats, developed to serve as an …

Don't miss

Cybersecurity news