Please turn on your JavaScript for this page to function normally.
Increase in enterprise cloud adoption and data risk

Skyhigh Networks analyzed actual cloud usage data from over 15 million enterprise employees across 350 enterprises. Although they found a record high percentage of cloud …

Five key IT security trends for 2015

Here’s a look at five key IT security trends and solutions for 2015. Rise in security breaches The current high level of security breaches, from the largest organization …

Do we need regular IT security fire drills?

IT security “fire drills’, supported by executive management and the risk committee should be conducted regularly in organizations, in order to understand the …

Security of data in the cloud now an executive-level concern

The Cloud Security Alliance (CSA) surveyed more than 200 IT and security professionals, and nearly 72 percent admitted that they did not know the number of shadow IT apps …

Compromised credentials in enterprise cloud apps

A new Netskope report shows a continued increase in cloud app usage across enterprises, as well as the high volume at which files are being shared outside of a given …

Tackling the growing web of data residency and privacy regulations

With an increasing number of companies moving to the cloud, we’ve seen a surge in investment by cloud providers to build international datacenters. While these …

1 in 5 employees going rogue with corporate data

Companies around the world have reason to be worried about the use of cloud applications to share mission-critical information. In fact, 1 in 5 employees has uploaded …

Cloud security: Do you know where your data is?

The rapid move towards virtualization and cloud infrastructure is delivering vast benefits for many organizations. In fact, Gartner has estimated that by 2016, 80% of server …

Cloud lock
CSA Guide to Cloud Computing

Authors: Raj Samani, Brian Honan, Jim Reavis Pages: 236 Publisher: Syngress ISBN: 0124201253 Introduction The title says it all: this is a book that will tell you what cloud …

Trends in Internet trust exploits, IoT, cyber espionage and privacy

In the third quarter, McAfee Labs detected more than 307 new threats every minute, or more than five every second, with mobile malware samples growing by 16 percent during the …

Cost savings drive businesses to the cloud

A survey of C-Level senior executives, developers and other industry delegates has found that 72% of respondents identified cost as the key benefit of using the cloud for the …

How to detect fraudulent activity in a cloud without invading users’ privacy

A group of researchers have found a clever way for cloud providers to detect fraudulent activities in their clouds without actually probing into the kind of activity a user …

Don't miss

Cybersecurity news