Please turn on your JavaScript for this page to function normally.
Tor Cloud project reaches the end of the line

The Tor Project has discontinued the Tor Cloud project due to a lack of dedicated software developers and maintainers.The Tor Cloud project was started in late 2011, with the …

IoT and the great data heist

The term mobile has evolved from the device that simply made and received phone calls, to smartphones, wearables and a multitude of devices in the home. With the introduction …

The risks of moving data into cloud and mobile environments

In this podcast recorded at RSA Conference 2015, Rich Campagna, VP, Products & Marketing at Bitglass, talks about how cloud and mobile and the the largest trends …

Microsoft announces bug bounties for Spartan, Azure

As the official launch of Windows 10 approaches, Microsoft has launched a new bug bounty related to its Technical Preview version, and is asking bug hunters to analyze its new …

Qualys
Qualys takes step towards complete automation of web app security

Qualys announced Qualys Web Application Firewall (WAF) version 2.0 that comes fully integrated with the Qualys Web Application Scanning solution (WAS). Presented at RSA …

Qualys Cloud Agent
Cloud agent platform for continuous IT asset inventory, security and compliance

At RSA Conference 2015, Qualys announced the launch of Qualys Cloud Agent Platform (CAP), which extends Qualys’ Cloud Security and Compliance Platform with lightweight agents …

Red door
Real-time traffic analysis and inventory of virtualized assets

Catbird Insight, a visualization solution for cloud and on-premise virtual environments that helps organizations rapidly discover, organize and analyze their virtual fabric to …

Cloud
Radware launches hybrid cloud based WAF service

Cyber attacks remain a persistent threat and have become sophisticated in size and scope. DoS, SQL injections and cross-site scripting are the most common web attack vectors, …

Five misunderstandings about cloud storage

Cloud storage is a solution that users are driving IT organizations to use whether we want to or not. Just ask a sales person what they use. They will tell you how great it is …

1 in 4 employees enable cloud attacks

While businesses are clearly embracing the power of cloud applications with each organization collaborating with an average of 865 other organizations – internal users, …

Dropbox launches bug bounty, will also pay for previously reported bugs

Dropbox is the latest company to officially announce a bug bounty program set up through the HackerOne platform. While the program has been up and running for several months …

Compromised credentials haunt cloud app usage

Netskope found that more than seven out of ten uploads from users with compromised accounts are to apps with a “poor” rating in the Netskope Cloud Confidence …

Don't miss

Cybersecurity news