cloud security
vOperations Suite 4: Clarity for cloud operations
VKernel released vOperations Suite 4, designed to provide operational clarity for cloud operators and enterprise data centers. This release introduces full Hyper-V …
CSA releases Cloud Controls Matrix 1.2
The Cloud Security Alliance (CSA) launched revision 1.2 of the Cloud Controls Matrix (CCM), available for free here. The CCM is designed to provide fundamental security …
Photobucket app helps catch a thief
Photobucket’s mobile app has played an unexpected role in the catching of a purse-snatching thief in California. The app, set to automatically upload the pictures taken …
Five mistakes companies make in their cloud strategies
When a company doesn’t fully define what the cloud can do for it, it leads to a less-than-optimized strategy that under serves the organization. To help IT pros avoid …
Trend Micro updates web gateway security
Trend Micro announced the latest release of the company’s web gateway solution, which now delivers visibility and control over the growing use of cloud-based …
Dropbox for Android security bypass vulnerability
A security issue has been reported in Dropbox for Android, which can be exploited by malicious people to bypass certain security restrictions, according to Tyrone Erasmus of …
Assessing the security of cloud providers
The Cloud Security Alliance announced the launch of a new initiative to encourage transparency of security practices within cloud providers. The CSA Security, Trust & …
Amazon extends cloud access, enables “identity federation” for accessing it
Amazon Web Services has extended Amazon Virtual Private Cloud (Amazon VPC) to all AWS Regions, allowing enterprises to launch their Amazon VPC environments in the US East and …
Granular access to encrypted data in the cloud
Newline Software announced the release of OPTIC, Online Privacy Technology In the Cloud. The solution allows developers to securely query, write, and read encrypted data to …
Testing the cloud
Managing IT networks requires a broad set of competencies in a growing number of technologies and products. It therefore makes sense that these competencies are centralized in …
IT control objectives for cloud computing
Cloud computing has become a major growth area in IT spending, and enterprises must adapt to the changes it brings to maximize the return on investment. To help organizations …
Verizon takes on issue of stolen credentials
Unauthorized access to corporate networks through stolen user names and passwords topped 45 percent in 2010, making credentials the second most compromised data type, …
Featured news
Resources
Don't miss
- Training an AI agent to attack LLM applications like a real adversary
- You don’t have to choose between BAS or automated pentesting, you shouldn’t
- Why your phishing simulations aren’t building a security culture
- Your security stack looks fine from the dashboard and that’s the problem
- Kali Linux 2026.1 ships BackTrack mode, eight new tools, and a kernel upgrade to 6.18