Please turn on your JavaScript for this page to function normally.
Companies embrace the cloud and BYOD, can’t control them

Cloud applications and mobile devices are increasing security and compliance risk at many US and UK enterprises. Alarmingly, the SailPoint survey reveals that while global …

Using firewall rules to migrate business applications to a private cloud

An increasing number of organizations are already taking advantage or planning to take advantage of the many financial and operational benefits that a private cloud has to …

Cloud security in 2014: Automation and consolidation

Eric Chiu, president and co-founder of HyTrust, predicts that in 2014: 1. Organizations will discover the importance of BYOS for public cloud. Given the recent disclosures …

CSA details Software Defined Perimeter Framework

The Cloud Security Alliance (CSA) announced the release of the Software Defined Perimeter Report, a new white paper report that explains the Software Defined Perimeter (SDP) …

Experts offer cyber security forecast for the year ahead

Kroll released its third annual Cyber Security Forecast, a prediction of the most significant cyber issues organizations will confront in 2014. The latest forecast highlights …

Eyes on the cloud: Six predictions for 2014

As we head into 2014, people in the cloud virtualization industry begin to wonder exactly what to expect from the technology in the New Year. We’ve seen some interesting …

Secure cloud storage service MEGA releases iOS app

MEGA is a secure cloud storage service with 50 GB free storage space. The official MEGA iOS app is now available on the App Store. Features: Browse and manage your MEGA cloud …

How IT will transform business in 2014

Generally speaking, I’m not a big fan of predictions. I’ve never met anyone with a crystal ball that doesn’t work near a boardwalk or a table ensconced in …

Overcoming the data privacy obstacle to cloud based test and development

How many times have data security and privacy constraints brought your key application development initiatives to a screeching halt? It usually occurs right around the time …

Secure Dropbox data using a hardware security token

Intrinsic-ID released Saturnus, an application that enables enterprises to protect digital assets stored and shared on Dropbox. With Saturnus, files are encrypted before they …

The state of governmental cloud deployments in Europe

The EU’s cybersecurity Agency ENISA has analyzed the present state of play regarding governmental cloud deployment in 23 countries across Europe. In the report the …

Unapproved cloud products put company data at risk

Egnyte released results from a new survey by Harris Interactive among 2,020 U.S. adults illustrates a major exposure for today’s businesses when it comes to the transfer …

Don't miss

Cybersecurity news