Cloud Security

Cloud Security | News, how-tos, features, reviews, and videos

google cloud services
CSO Digital Magazine, Spring 2019

cloud security data breach crime accessible

SoftNAS Cloud 0day found: Upgrade ASAP

SoftNAS Cloud users should upgrade immediately following a report by Digital Defense that the virtual cloud appliance is vulnerable to a session management security issue.

rocket launch startup cloud success growth

12 of the hottest startups at the RSA Conference 2019

These RSAC Early Stage Expo startups bring fresh cybersecurity solutions to fight phishing, improve application security, provide better cloud protections, enforce security policy, more accurately authenticate and more.

10 cloud security breach virtualization wireless

Multi-vector attacks target cloud-hosted technologies

Securonix report outlines the threat posed by automated multi-vector, multi-platform attacks against cloud infrastructure.

ibm cloud lab

IBM says buying Red Hat makes it the biggest in hybrid cloud

$34 billion deal scheduled to go through sometime in the second half of 2019

network security digital internet firewall binary code

What are next generation firewalls? How the cloud and complexity affect them

Nextgen firewalls add features like behavioral analytics, malware detection, and content monitoring to prevent unauthorized access and data exfiltration. They could do much more in the future.

1 intro security executive thinking woman face binary

12 things every IT security professional should know

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know.

10 cloud security breach virtualization wireless

What are Amazon Zelkova and Tiros? AWS looks to reduce S3 configuration errors

Amazon’s latest tools help identify where data might be left exposed in your AWS S3 cloud environments.

blockchain bitcoin circuitry global

Blockchain will be the killer app for supply chain management in 2018

The distributed ledger technology that underpins cryptocurrencies is now poised to disrupt supply chain management – especially in the global shipping industry.

01 hot products at rsa 2018

Hottest cybersecurity products at RSA 2018

Here's a quick run-down of some of the new products announced at the conference, or shown there for the first time.

Adobe’s CSO talks security, the 2013 breach, and how he sets priorities

Brad Arkin has led Adobe's new approach to security and aims to make sure one of history’s biggest data breaches doesn’t happen again.

social media multiple logos

Reputational risk and social media: When you're blocked or banned without notice

Businesses depend on sites like Facebook, Twitter, Dropbox, and Apple to interact with customers, promote their messages and store content. One complaint against you can shut you off from those services and damage your brand.

Government building with greek columns

What is FedRAMP? How cloud providers get authorized to work with the U.S. government

The process for getting the FedRAMP seal of approval is complex, but it can ultimately be lucrative for companies that meet the security requirements.

cloud network blockchain bitcoin storage

Blockchain and cryptocurrency may soon underpin cloud storage

Emerging now: P2P networks that use blockchain to manage cloud storage based on the sharing of excess drive and network capacity on PCs and in data centers. Those who share capacity get free storage – and can be paid in cryptocurrency....

blockchain ecosystem

5 ways blockchain is the new business collaboration tool

While the full potential of blockchain may not be understood by business execs, that's not keeping companies from aggressively exploring how the secure, distributed ledger technology can save time and money.

blockchain challenge

Microsoft wants to use blockchain to secure your identity

Microsoft plans to pilot a blockchain-based digital ID platform that would allow users to control access to sensitive online information via an encrypted data hub.

net neutrality

Will the end of net neutrality be a security nightmare?

Effects of the net neutrality repeal are hard to predict, but there could be additional costs for using endpoint security tools if data rates rise. Best advice: Stay the course on security for now.

cyber attack virus meltdown

How bad are Meltdown and Spectre?

Some people aren't taking hardware vulnerabilities like Meltdown and Spectre seriously. Here's a point-by-point rebuttal to their arguments.

Broken window with band-aid patch

Meltdown and Spectre patches: Where to start and what to expect

You need to apply Meltdown and Spectre patches to pretty much everything in your enterprise. And you need to start now. We help you prioritize.

Load More
Recommended for You