cloud security
Mobile application security in the cloud
Rapid adoption of mobile devices and mobile apps as a critical part of an enterprise IT strategy has created a significant and unbounded security risk. Challenged to implement …
Organizations still don’t understand application security strategies
Organizations lack a sense of urgency for securing critical data, according to a new report by Application Security. The report found that the greatest challenges to securing …
63.7% of organisations plan a cloud investment this year
Only 36.3% of organizations are not planning any cloud investment, suggesting that previous fears of moving into the cloud may have abated, according to Ipswitch. Cloud …
Cloud operating system for public, private and hybrid clouds
Joyent released SmartDataCenter 6, the newest version of its cloud operating system, an integrated suite of software and services designed for service providers and …
Global workforce and the cloud
Every couple of years (ISC)2 issue a report on the current situation and future expectations regarding the global information security workforce. At the Infosecurity press …
Chinese Trojan targets cloud-based AV technologies
A Trojan that tries to obstruct cloud-based antivirus technology present in major AV solutions offered by Chinese security firms is targeting users by posing as a video player …
40% of executives not planning to adopt the cloud
Forty percent of C-level executives have stated that they are not planning to adopt cloud computing, according to a report by ISACA. Respondents who do not plan to use cloud …
Security professionals focus on cloud computing skills
Information security professionals may be focusing on familiar territory rather than new paradigms when it comes to skilling up for the cloud, suggest early survey results …
Managed Wi-Fi access and PCI scanning in a single device
AirTight Networks launched Secure Wi-Fi – a suite of managed services which adds Wi-Fi access. With today’s launch, the company offers hosted, cloud-based, secure …
The security landscape from 2010 to 2011
Vendor-neutral testing and certification firm ICSA Labs offers its thoughts on the security landscape spanning 2010 and 2011. Mobile security 1. While most hackers heavily …
Cloud Controls Matrix 1.1 released
The Cloud Security Alliance (CSA) launched revision 1.1 of the CCM Security Controls Matrix, available for free here. The Cloud Security Alliance Cloud Controls Matrix (CCM), …
Underground toolkits will make cyber espionage easy
With the growing diversity of operating systems among companies, as well as the growing use of mobile devices, cybercriminals should have a very profitable 2011. Their tactic …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility