Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Microsoft announces Windows bug bounty program with payouts ranging between $500 and $250,000 [Read More]
Hundreds of organizations may be exposing sensitive information via misconfigured Google Groups [Read More]
Dow Jones has exposed the details of millions of customers via a misconfigured AWS S3 bucket [Read More]
Human error led to the personal details of millions of Verizon customers being exposed online, but the telecoms giant has downplayed the incident [Read More]
Cloud security firm HyTrust acquires data visibility company DataGravity and raises $36 million in a funding round led by AVP [Read More]
Microsoft fixes important privilege escalation vulnerability in Azure Active Directory (AD) Connect [Read More]
Elastic Beam emerges from stealth mode with AI-powered API security solution [Read More]
San Jose, CA-based cloud security start-up ShieldX Networks has emerged from stealth with a new product to secure cloud infrastructure. [Read More]
Arbor Networks used IP addresses provided by US-CERT to analyze North Korea’s Hidden Cobra DDoS attacks [Read More]
IBM Security announces new cloud identity service that will become available in the IBM Cloud Marketplace later this week [Read More]

FEATURES, INSIGHTS // Cloud Security

rss icon

Jennifer Blatnik's picture
While using containers to secure your organization is a relatively novel approach, it can lead to cost savings and massive scalability.
David Holmes's picture
How do you secure application components when they’re shifting from cloud to cloud? Any traffic traversing from one public cloud to another is by definition crossing the Internet and should therefore not be trusted.
Alan Cohen's picture
Traditional incident management approaches that rely on network monitoring and detection of attacks are also falling short in today’s agile and distributed computing world.
Alan Cohen's picture
Now that we are coming up on the second “year of the hack”—who said good things only come around once, right?
Marc Solomon's picture
To ensure you understand and can address the main security challenges cloud apps can introduce to your organization, you need additional visibility and context.
Marc Solomon's picture
How do we handle the responsibility that cloud computing brings? It’s a responsibility that must be shared among vendors, users, business leaders, and IT security professionals and involves three key aspects.
Alan Cohen's picture
Like other forms of technical debt, security debt must be paid down, which ultimately leads to a more agile and secure enterprise.
Danelle Au's picture
If your organization is not equipped to deal with the security of Emergent IT, it is probably not equipped to deal with the security of mainstream applications sanctioned by IT.
Joshua Goldfarb's picture
When moving to the cloud, companies must understand the implications, enumerate the risks, and mitigate those risks accordingly.
Alan Cohen's picture
Today’s network perimeter is increasingly not a single physical or virtual place, yet much of the industry debate is still focused on the perimeter.