Cloud Services

Tightening the fed's belt: Government Roundtable

Tightening the fed's belt: Government Roundtable

By

At a recent SC Magazine Roundtable, gov't security pros bemoaned the difficulty in obtaining resources. But instead of crying over spilled milk, they traded ideas for mitigating risk in a down economy.

RSA Conference 2012: The threat of the new generation of employees

By

Enrique Salem's keynote speech at the RSA Conference 2012 discussed an emerging enterprise security threat, the "digital native."

iCloud and enterprise IT

iCloud and enterprise IT

When Apple announced iCloud at its Worldwide Developers Conference last June, it set acolytes abuzz with anticipation.

Apple releases OS X, iOS, Safari updates

By

Apple on Wednesday issued much-anticipated updates for its Mac OS X and iOS mobile operating system, adding support for its new iCloud service, and fixing a bevy of security flaws.

Cutting the red tape: SC Roundtable

Cutting the red tape: SC Roundtable

By

As agencies are forced to do more with less, government security pros at a recent SC Magazine Roundtable discussion said they are being challenged to fight emerging threats and secure new technologies.

No pointing fingers: Defense in the cloud is everyone's responsibility

No pointing fingers: Defense in the cloud is everyone's responsibility

Protecting data in the cloud is a shared sacrifice for end-users and providers, but understanding who needs to do what can sometimes be tricky.

The cloud can actually make data safer

The cloud can actually make data safer

We need to do a far better job of demonstrating that the infrastructure and services we are putting into the cloud are superior to what we have today.

Criminals abusing Amazon cloud to spread SpyEye

By

Amazon's Simple Storage Service (S3) is being used to host malicious sites distributing the nefarious banking trojan.

Nonprofit will publish how providers secure cloud

By

The Cloud Security Alliance is planning to develop and maintain a public registry documenting the security controls that exist in various cloud computing offerings.

Make the provider responsible

Make the provider responsible

Using third-party cloud services, enterprises can quickly and affordably increase and decrease service or compute power at will.

Sign up to our newsletters

POLL