cloud security
Dell releases secure, managed, ultra-mobile cloud access device
Dell announced Dell Wyse Cloud Connect, an ultra-compact and highly mobile cloud-access device that delivers desktop virtualization and personal cloud services to any HDMI- or …
IT underestimates cloud app usage by 90%
Cloud app adoption continues to spread across virtually every business function, from marketing to human resources. However, while enterprise app use continues to grow, …
Free trial for cloud-based encryption and secure key management on AWS
SafeNet announced a thirty-day free trial of its ProtectV virtual encryption solutions and Virtual KeySecure via AWS Marketplace on Amazon Web Services (AWS). Financial …
How to implement incident reporting in cloud computing
Cloud security incidents often catch the media’s attention as they affect large number of users. For example, recently a large storage service provider suffered an …
Security concerns are still holding back cloud adoption
There are significant differences in public cloud infrastructure concerns between the cloud-wise, organizations that are currently using cloud services, and the cloud-wary, …
Key trends in ransomware, evasion techniques and social attacks
McAfee Labs released a predictions report, analyzing 2013 trends through its Global Threat Intelligence (GTI) service to forecast the threat landscape for the coming year. In …
Federal agency cloud adoption increases 400%
Tripwire announced the results of a survey on cloud security technology trends in the federal government. The survey evaluated the attitudes of more than 100 federal …
IBM prevents services from running compromised code
IBM inventors have patented a technique that can enable businesses to improve cloud security and support secure transactions by preventing mobile devices from accessing …
Companies embrace the cloud and BYOD, can’t control them
Cloud applications and mobile devices are increasing security and compliance risk at many US and UK enterprises. Alarmingly, the SailPoint survey reveals that while global …
Using firewall rules to migrate business applications to a private cloud
An increasing number of organizations are already taking advantage or planning to take advantage of the many financial and operational benefits that a private cloud has to …
Cloud security in 2014: Automation and consolidation
Eric Chiu, president and co-founder of HyTrust, predicts that in 2014: 1. Organizations will discover the importance of BYOS for public cloud. Given the recent disclosures …
CSA details Software Defined Perimeter Framework
The Cloud Security Alliance (CSA) announced the release of the Software Defined Perimeter Report, a new white paper report that explains the Software Defined Perimeter (SDP) …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility