Please turn on your JavaScript for this page to function normally.
90% of DLP violations occur in cloud storage apps

90 percent of data loss prevention (DLP) violations occur in cloud storage apps, and a large percentage of these are for enterprise confidential intellectual property or …

CSA releases tool for personal data legal protection

At Infosecurity Europe 2015, the Cloud Security Alliance (CSA) Privacy Level Agreement (PLA) Working Group released the Privacy Level Agreement (PLA) v2, a tool that provides …

Shadow IT is prevalent in government agencies

Despite clear benefits of cloud services – greater collaboration, agility, and cost savings – federal agencies are slow to migrate to the cloud due to security concerns. As a …

Endpoint Protector gets integration with cloud storage apps

At Infosecurity Europe 2015, CoSoSys announced the development of Endpoint Protector 4 to include new integrations with Dropbox for Business and Box to strengthen data …

CipherCloud offers compliance advice regarding EU privacy laws

As the EU moves towards stricter data privacy rules, companies operating in the region are grappling with translating legal policy into business practices. In light of this …

Cloud SaaS data protection strategies

Handing control of sensitive data to a third-party cloud service provider remains one of the biggest data compliance challenges today. Top executives from Perspecsys are on …

Cloud security best practices during all phases of the infrastructure lifecycle

In the era of cloud technology, online attacks are becoming more sophisticated. The days of drive-by exploitation are passing us by, replaced by attackers who run continuous …

Fire
Total data protection outside the firewall

Gartner called Cloud Access Security Brokers (CASBs) the number one technology for information security in 2014. In fact, by 2016, 25% of enterprises will secure access to …

Increasing cloud adoption will drive IT innovation

DevOps is a software development and IT management method that brings software engineering, quality assurance, and IT operations together as an integrated team to …

Tor Cloud project reaches the end of the line

The Tor Project has discontinued the Tor Cloud project due to a lack of dedicated software developers and maintainers.The Tor Cloud project was started in late 2011, with the …

IoT and the great data heist

The term mobile has evolved from the device that simply made and received phone calls, to smartphones, wearables and a multitude of devices in the home. With the introduction …

The risks of moving data into cloud and mobile environments

In this podcast recorded at RSA Conference 2015, Rich Campagna, VP, Products & Marketing at Bitglass, talks about how cloud and mobile and the the largest trends …

Don't miss

Cybersecurity news