Please turn on your JavaScript for this page to function normally.
Panda Security updates Cloud Office Protection

Panda Security released Panda Cloud Office Protection (PCOP) 6.7, which will enable users to roll-out Panda Cloud Systems Management (PCSM) automatically on their network. …

Cloud Computing: Theory and Practice

Once a buzzword, cloud computing is now a part of nearly every modern IT infrastructure. Despite a variety of privacy, security and compliance concerns, companies large and …

AWS cloud management APIs: Don’t overlook a key security component

Xceedium has enhanced Xsuite to include protection for the Amazon Web Services management APIs that advanced cloud customers use to monitor and configure their AWS …

Offshore providers with no cloud strategy risk their future

While the increased use of industrialized services will reduce the volume of traditional and customized services, the impact on offshore providers will be counterbalanced by …

Deliver real-time phishing detection from Webroot and RSA

Webroot announced a technology partnership with RSA, The Security Division of EMC, to provide real-time phishing detection to RSA FraudActionSM Anti-Phishing Service. Phishing …

Cloud strategy and evaluation considerations

Wisegate, a private, practitioner-based IT research service for qualified senior technology professionals, released a new industry case study designed to help IT professionals …

Selecting a cloud provider starts with exit planning

Let’s begin with a story: The first day of the new week started very ordinarily and nothing indicated this was going to be a very long and tiring day for Sarah, a CIO of …

Audit privileged access to Microsoft Online Services

Xceedium announced Xsuite will include protection for Office 365, Exchange, Lync, and SharePoint. The additional protection for Microsoft online services complements …

Can you trust your online backup service?

While having lots of digital storage space at your physical location may be cheap nowadays, it’s also very useful to have offsite backups – not only in the event …

Attitudes towards data protection and encryption in the cloud

An increasing number of organizations are transferring sensitive or confidential data to the cloud despite concerns over data protection, according to the Ponemon Institute. …

Mobile and cloud data risks exposed

A new Ponemon eport focuses on the risks associated with employee access to regulated data, such as protected health and financial information, via company or personal mobile …

Creating a cloud security policy

Building a cloud security policy is a crucial step to take before diving into the cloud to ensure maximum benefits are achieved and data is secure. But some organizations, in …

Don't miss

Cybersecurity news