Cloud

Addressing attacks on critical infrastructure

Just recently we witnessed the U.S. House of Representative pass two bills aimed at bolstering the security operations of the nation's critical infrastructure.

iCloud beefs up security in wake of celebrity nude photo scandal

By

Apple's CEO said the company will begin using email and push notifications to alert users to passwords changes in any iCloud account.

How safe is cloud - really?

How safe is cloud - really?

Revelations of government surveillance are fueling a paranoia that isn't going to subside. Kate O'Flaherty asks whether firms should be afraid of adopting cloud?

Cloud in an information world

Cloud in an information world

Nation-states are flexing their muscles in the cyber realm, says Avatier's Ryan Ward.

Let CHAOS rein

Let CHAOS rein

Now is the time for infosec pros to embrace CHAOS and protect organizations from the realities of our always-on world.

Debate: Data in the cloud is more secure than on premises.

Experts debate whether data in the cloud is more secure than data that's housed on an organization's premises.

HP tests 10 popular IoT devices, most raise privacy concerns

HP tests 10 popular IoT devices, most raise privacy concerns

By

In a study, HP Fortify tested 10 popular Internet of Things (IoT) devices, including TVs, webcams and device control hubs.

CSA releases updated cloud security guidance

By

Today, updated versions of the Cloud Controls Matrix and Consensus Assessments Initiatives Questionnaire hit the web.

NIST drafts report on cloud computing challenges, requests comments

By

NIST presents 65 challenges of cloud computing divided into nine categories in an effort to build consensus and formulate solutions.

Four stages of cloud security challenges

Four stages of cloud security challenges

Infrastructure cloud computing presents a plethora of challenges that are derived from the company's cloud resources.

The Microsoft dilemma: Why security isn't enough

The Microsoft dilemma: Why security isn't enough

In the world of information security, naturally, security is of paramount importance, but control is king.

Google transparency report outs providers lacking email encryption

Google transparency report outs providers lacking email encryption

By

For the first time, the report shows how often providers encrypt communications coming to and from Gmail.

Study: Security pros still grappling with lax password policies

Study: Security pros still grappling with lax password policies

By

Surveys conducted at the RSA Conference revealed that many can still access former employers' systems and most eschewed the cloud for sensitive data.

Yahoo enhances data security through encryption efforts

By

On Wednesday, Yahoo's CISO Alex Stamos announced the security measures.

Ahead in the cloud

Ahead in the cloud

Growth businesses are always looking for flexible ways of working that reduce capital and running costs, while securely delivering the data users need, when and where they need it.

Gov't snooping drives companies away from cloud adoption, study finds

By

Of the respondents participating in a just released survey, 33 percent indicated that they are less likely to adopt the cloud due to fears of government surveillance.

Organizations not doing enough to protect cloud data, study finds

By

Enterprises are still not being proactive enough in securing the data they have in the cloud, according to a recent study.

Canada signs Wedge Networks to secure government data centers

By

The Canadian government has hired Wedge Networks, a provider of cloud-based security services, to secure its computing infrastructure.

Beyond the hype of industry trends

Beyond the hype of industry trends

Cloud computing is becoming a reality that will need to be addressed by every security department.

RSA 2014: RedOwl Analytics named "Most Innovative Company" at Innovation Sandbox

By

Baltimore-based RedOwl Analytics was named "Most Innovative Company" at the RSA Conference 2014 Innovation Sandbox event.

Security at scale for the enterprise: Borrowing a page from home security handbooks

Security at scale for the enterprise: Borrowing a page from home security handbooks

The tools that organizations have relied on to protect their networks are antiquated and no longer work.

Securing data in the cloud: Mandate for encryption and key management

Securing data in the cloud: Mandate for encryption and key management

While agility, availability and lower TCO will drive business to the cloud, organizations must address open questions around the security and compliance of PHI, PII, and who has access to it.

2014: The year of encryption and the summer of key management

2014: The year of encryption and the summer of key management

In order to unlock the floodgates, we need to address the security concerns of moving everything to the cloud. Fortunately, cloud providers today are heavily invested in addressing this issue.

Cloud: From both sides now

Cloud: From both sides now

While cloud vendors vie for dominance in attracting customers with their promises of data access anywhere, and better security than a company might be able to provide for itself, the bottom line is that client companies are responsible for their data, regardless of where it resides.

Cloud: New Age defense

Cloud: New Age defense

By

The cloud offers reliability, cost savings and convenience, but protecting it requires modern-day defenses, reports Jim Romeo.

DevOps: Today, tomorrow and secure

DevOps: Today, tomorrow and secure

Will 2013 be remembered as the year that DevOps accelerated into the IT mainstream or became just another trend that died in the "hype cycle"?

Harnessing data, cloud applications, and mobility in 2014

Harnessing data, cloud applications, and mobility in 2014

I'm not a big predictions guy. I don't own a crystal ball, though I have been known to ask questions of my daughter's "Magic 8-Ball" on occasion. When it comes to enterprise IT, however, I do have some strong opinions about what 2014 will bring.

2013 Industry Innovators: Virtualization and cloud security

2013 Industry Innovators: Virtualization and cloud security

By

When we talk about the cloud, we need to realize that the concept of the cloud is a business, not a technical, construct.

Securing small to medium sized enterprises in the cloud

By

In this video, David Campbell, founder and CEO of JumpCloud, discusses security in the cloud when it comes to small to medium sized enterprises.

Cloud addiction: At what point does the elastic snap?

Cloud addiction: At what point does the elastic snap?

Why does the lure of the cloud tempt businesses to put ever more sensitive data at risk? Richard Moulds, VP of strategy at Thales e-Security examines the situation.

Sign up to our newsletters

POLL