Please turn on your JavaScript for this page to function normally.
F5 Networks releases hybrid cloud solution for mobile application management

F5 Networks announced F5 Mobile App Manager, a new hybrid cloud solution for mobile application management that enables organizations to safely support enterprise BYOD …

Cloud computing in critical information infrastructure protection

ENISA has launched a new report looking at cloud computing from a Critical Information Infrastructure Protection (CIIP) perspective, and identifying that cloud computing is …

Opportunistic scanning from cloud to endpoint

iScan Online introduces opportunistic security scanning from the cloud to any device. They perform internal PAN, PCI and Vulnerability scanning without installing software or …

PCI DSS cloud computing guidelines

The PCI Security Standards Council (PCI SSC) published the PCI DSS Cloud Computing Guidelines Information Supplement, a product of the Cloud Special Interest Group (SIG). …

Fear of government snooping hinders cloud adoption

Almost half of IT experts are deterred from keeping sensitive data in the cloud because of fear of government intervention and possible legal action, according to Lieberman …

Cisco unveils open networking “fabric” for data centers, clouds

Network speed, latency, and greater network port density in a single unit are key considerations for customers deploying virtualized data centers and moving to a managed cloud …

Most organizations plan to increase number of cloud apps

According to the results of a OneLogin survey on the adoption, use and security of cloud applications, a large majority of respondents, 78%, plan to increase the number of …

Users trust the cloud with important data

New research from Rackspace shows that Brits may be trusting the cloud as never before with up to £24 billion worth of digital assets stored remotely. According to the …

The dangers of third-party code for cloud security

Imperva announced a new report which examines the dangers of third-party code in cloud computing. In December 2012, a hacker breached Yahoo! with an SQL injection attack that …

Infoblox unveils new solutions for security, availability and automation

Infoblox announced new products enable organizations to manage the demands put on their networks by BYOD, cloud computing, migration to IPv6 and the evolving cyber-threat …

The cloud will impact the way security is consumed

Increased adoption of cloud-based computing is expected to impact the way security is consumed as well as how key government agencies will prioritize security of public cloud …

ObjectRocket launches MongoDB cloud service

ObjectRocket launched its fast and scalable MongoDB database-as-a-service (DBaaS). The platform is specifically architected to provide a fast and predictable MongoDB …

Don't miss

Cybersecurity news