Cloud News, Articles and Updates
At SC Congress Toronto, Evgeniy Kharam, director and network security solutions architect at Herjavec Group predicted that the future network security was in machine learning, quantum computing and the cloud.
The cloud is creating numerous security challenges that Intel's Brian Dye said could be resolved by taking specific steps.
Psychological acceptability may not sound like a term that'll hold much significance for the future of secure file sharing, but don't sell it short.
To avoid damage from staff using social media, a radio network made certain its cloud was defended. Greg Masters reports.
Critical datacenter assets are at the heart of financial services (and many other industries) enterprise networks. Unfortunately, it's still too easy for attackers to get into the datacenter through an insider, a partner, a side server, virtualization, or even a development environment.
Moving enterprise apps to the cloud is becoming a very attractive option for organizations striving to cut IT costs while improving agility and scalability.
Just recently we witnessed the U.S. House of Representative pass two bills aimed at bolstering the security operations of the nation's critical infrastructure.
Apple's CEO said the company will begin using email and push notifications to alert users to passwords changes in any iCloud account.
Revelations of government surveillance are fueling a paranoia that isn't going to subside. Kate O'Flaherty asks whether firms should be afraid of adopting cloud?
Nation-states are flexing their muscles in the cyber realm, says Avatier's Ryan Ward.
Now is the time for infosec pros to embrace CHAOS and protect organizations from the realities of our always-on world.
Experts debate whether data in the cloud is more secure than data that's housed on an organization's premises.
In a study, HP Fortify tested 10 popular Internet of Things (IoT) devices, including TVs, webcams and device control hubs.
Today, updated versions of the Cloud Controls Matrix and Consensus Assessments Initiatives Questionnaire hit the web.
NIST presents 65 challenges of cloud computing divided into nine categories in an effort to build consensus and formulate solutions.
Infrastructure cloud computing presents a plethora of challenges that are derived from the company's cloud resources.
In the world of information security, naturally, security is of paramount importance, but control is king.
For the first time, the report shows how often providers encrypt communications coming to and from Gmail.
Surveys conducted at the RSA Conference revealed that many can still access former employers' systems and most eschewed the cloud for sensitive data.
On Wednesday, Yahoo's CISO Alex Stamos announced the security measures.
Growth businesses are always looking for flexible ways of working that reduce capital and running costs, while securely delivering the data users need, when and where they need it.
Of the respondents participating in a just released survey, 33 percent indicated that they are less likely to adopt the cloud due to fears of government surveillance.
Enterprises are still not being proactive enough in securing the data they have in the cloud, according to a recent study.
The Canadian government has hired Wedge Networks, a provider of cloud-based security services, to secure its computing infrastructure.
Cloud computing is becoming a reality that will need to be addressed by every security department.
Baltimore-based RedOwl Analytics was named "Most Innovative Company" at the RSA Conference 2014 Innovation Sandbox event.
The tools that organizations have relied on to protect their networks are antiquated and no longer work.
While agility, availability and lower TCO will drive business to the cloud, organizations must address open questions around the security and compliance of PHI, PII, and who has access to it.
In order to unlock the floodgates, we need to address the security concerns of moving everything to the cloud. Fortunately, cloud providers today are heavily invested in addressing this issue.
While cloud vendors vie for dominance in attracting customers with their promises of data access anywhere, and better security than a company might be able to provide for itself, the bottom line is that client companies are responsible for their data, regardless of where it resides.
SC Magazine Articles
- Industry pros react to Cisco, Fortinet advisories after possible Snowden NSA leak
- WikiLeaks postings of Turkish emails included active links to malware
- U.S. government extends offer to protect states from electoral cyberthreats
- Cisco shedding 7% of its workforce
- DroidJack attacks delivered through Twilio SMS messages
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- CEO sacked after aircraft company grounded by whaling attack
- Microsoft warns of new, self-propagating ransomware in the wild
- Wendy's POS breach 'considerably' bigger than first thought
- After NSA leaks, a renewed interest in vulnerability disclosure
- USAA members hit with multiple phishing attacks
- Saving money on security software by improving cyber posture, report
- Two-thirds of IT security pros surveyed expect a breach to hit their company, report
- Epic hack, thousands of salted logins stolen