cloud security
Auditing of Web apps with analytics dashboard for compliance
SaaSID has launched Cloud Application Manager 2.0 (CAM), the latest version of its browser-based authentication, management and auditing solution. CAM 2.0’s audit report …
Radware launches cloud-based DDoS attack mitigation system
At RSA Conference 2013 in San Francisco, Radware announced DefensePipe, an integrated and comprehensive solution to help mitigate volumetric DDoS attacks which threaten to …
Qualys and Verizon join forces for new IT security and compliance solutions
Qualys and Verizon announced an agreement to expand their relationship to deliver new advanced cloud-based IT security and compliance management services to organizations …
Big Data cloud solutions powered by open source analytics database
At RSA Conference 2013 in San Francisco, Virtustream announced it has partnered with Metamarkets and Skilled Analysts to offer big data solutions in the cloud. There is a …
CloudLock unveils Community Trust Rating
CloudLock unveiled the Community Trust Rating as part of its Cloud Information Security Suite at RSA Conference 2013. The third-party application trust assessment system uses …
Qualys brings vulnerability management to Amazon EC2 and VPC
At RSA Conference 2013 in San Francisco, Qualys announced powerful new vulnerability management capabilities for Amazon EC2 and VPC customers using a QualysGuard connector …
Connect securely to the cloud using JSON and XMPP
At the RSA Conference 2013 in San Francisco, Express Logic and Cypherbridge Systems announced the integration of the Cypherbridge embedded secure Cloud Device Kit for Express …
A framework for building privacy-oriented apps
At the RSA Conference 2013 in San Francisco, SpiderOak announced it is launching privacy into the mainstream with the unveiling of Crypton, a “zero-knowledge” …
F5 Networks releases hybrid cloud solution for mobile application management
F5 Networks announced F5 Mobile App Manager, a new hybrid cloud solution for mobile application management that enables organizations to safely support enterprise BYOD …
Cloud computing in critical information infrastructure protection
ENISA has launched a new report looking at cloud computing from a Critical Information Infrastructure Protection (CIIP) perspective, and identifying that cloud computing is …
Opportunistic scanning from cloud to endpoint
iScan Online introduces opportunistic security scanning from the cloud to any device. They perform internal PAN, PCI and Vulnerability scanning without installing software or …
PCI DSS cloud computing guidelines
The PCI Security Standards Council (PCI SSC) published the PCI DSS Cloud Computing Guidelines Information Supplement, a product of the Cloud Special Interest Group (SIG). …
Featured news
Sponsored
Don't miss
- Aerospace employees targeted with malicious “dream job” offers
- CISOs in 2025: Balancing security, compliance, and accountability
- Cyber professionals face an IP loss reckoning in 2025
- Tips for a successful cybersecurity job interview
- Microsoft fixes actively exploited zero-days (CVE-2024-43451, CVE-2024-49039)