cloud security
Forensics for advanced threat activity
Damballa announced Failsafe 5.0, a solution that hunts for undetected threats by correlating a variety of observed network behaviors that indicate malware-infected devices …
Security threats to expand in 2012
Attackers are sidestepping automated security technology and are using social engineering and data mining to orchestrate attacks against prominent individuals and their …
Oracle Solaris 11: The first cloud OS
Oracle today released Solaris 11, the first Cloud OS. Oracle Solaris 11 is designed to meet the security, performance and scalability requirements of cloud-based deployments …
Hardware-based enterprise key management platform
Escalating threats, expanding regulatory requirements, and the movement to cloud-based and virtualized infrastructures are driving the need for a more unified approach to …
New cloud computing credential
CompTIA and ITpreneurs are collaborating on a new cloud computing skills credential. The Cloud Essentials exam, scheduled for availability in December 2011, will validate …
Secure access to Office 365 cloud-based web applications
RSA SecurID can now be integrated with the Windows Active Directory Federation Services 2.0 (AD FS 2.0). This integration can enable organizations to provide secure user …
McAfee updates its Cloud Security Platform
McAfee announced the latest enhancements to its Cloud Security Platform which secures all primary channels of traffic – email, web and authentication – moving …
GFI Software cloud-based anti-malware and anti-spam email security
GFI Software announced that GFI MailEssentials Complete Online, a cloud-based anti-malware and anti-spam email security solution, is now available to small and medium …
Focusing on new technologies instead of security threats
In the rush to utilize new technologies and move into the increasingly borderless world of cloud computing, mobile devices and social media, a growing gap is developing …
Managing firewall risks in the cloud
67 percent of IT security respondents in a Ponemon Institute study, report that their organization is very vulnerable or vulnerable because cloud ports and firewalls are not …
How organizations manage cloud computing security risks
A Ponemon Institut survey of 1,000 IT security practitioners and enterprise compliance officers revealed that less than half of all respondents believe their organizations …
Security concerns limit cloud computing use in law firms
Law firm technology managers are tempering their interest in cloud computing with a heightened focus on security, according to an annual survey published in The American …