Cloud News, Articles and Updates
At SC Congress Toronto, Evgeniy Kharam, director and network security solutions architect at Herjavec Group predicted that the future network security was in machine learning, quantum computing and the cloud.
The cloud is creating numerous security challenges that Intel's Brian Dye said could be resolved by taking specific steps.
Psychological acceptability may not sound like a term that'll hold much significance for the future of secure file sharing, but don't sell it short.
To avoid damage from staff using social media, a radio network made certain its cloud was defended. Greg Masters reports.
Critical datacenter assets are at the heart of financial services (and many other industries) enterprise networks. Unfortunately, it's still too easy for attackers to get into the datacenter through an insider, a partner, a side server, virtualization, or even a development environment.
Moving enterprise apps to the cloud is becoming a very attractive option for organizations striving to cut IT costs while improving agility and scalability.
Just recently we witnessed the U.S. House of Representative pass two bills aimed at bolstering the security operations of the nation's critical infrastructure.
Apple's CEO said the company will begin using email and push notifications to alert users to passwords changes in any iCloud account.
Revelations of government surveillance are fueling a paranoia that isn't going to subside. Kate O'Flaherty asks whether firms should be afraid of adopting cloud?
Nation-states are flexing their muscles in the cyber realm, says Avatier's Ryan Ward.
Now is the time for infosec pros to embrace CHAOS and protect organizations from the realities of our always-on world.
Experts debate whether data in the cloud is more secure than data that's housed on an organization's premises.
In a study, HP Fortify tested 10 popular Internet of Things (IoT) devices, including TVs, webcams and device control hubs.
Today, updated versions of the Cloud Controls Matrix and Consensus Assessments Initiatives Questionnaire hit the web.
NIST presents 65 challenges of cloud computing divided into nine categories in an effort to build consensus and formulate solutions.
Infrastructure cloud computing presents a plethora of challenges that are derived from the company's cloud resources.
In the world of information security, naturally, security is of paramount importance, but control is king.
For the first time, the report shows how often providers encrypt communications coming to and from Gmail.
Surveys conducted at the RSA Conference revealed that many can still access former employers' systems and most eschewed the cloud for sensitive data.
On Wednesday, Yahoo's CISO Alex Stamos announced the security measures.
Growth businesses are always looking for flexible ways of working that reduce capital and running costs, while securely delivering the data users need, when and where they need it.
Of the respondents participating in a just released survey, 33 percent indicated that they are less likely to adopt the cloud due to fears of government surveillance.
Enterprises are still not being proactive enough in securing the data they have in the cloud, according to a recent study.
The Canadian government has hired Wedge Networks, a provider of cloud-based security services, to secure its computing infrastructure.
Cloud computing is becoming a reality that will need to be addressed by every security department.
Baltimore-based RedOwl Analytics was named "Most Innovative Company" at the RSA Conference 2014 Innovation Sandbox event.
The tools that organizations have relied on to protect their networks are antiquated and no longer work.
While agility, availability and lower TCO will drive business to the cloud, organizations must address open questions around the security and compliance of PHI, PII, and who has access to it.
In order to unlock the floodgates, we need to address the security concerns of moving everything to the cloud. Fortunately, cloud providers today are heavily invested in addressing this issue.
While cloud vendors vie for dominance in attracting customers with their promises of data access anywhere, and better security than a company might be able to provide for itself, the bottom line is that client companies are responsible for their data, regardless of where it resides.
SC Magazine Articles
- Blasphemy! Godless malware preys on nearly 90 percent of Android devices
- 'Password attacks' continue; Citrix becomes latest victim
- Guccifer 2.0 out - Cozy Bear, Fancy Bear hacked DNC, Fidelis analysis shows
- Acer breach caused by improperly stored data
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- CEO sacked after aircraft company grounded by whaling attack
- Microsoft warns of new, self-propagating ransomware in the wild
- Wendy's POS breach 'considerably' bigger than first thought
- No hacking required: Israeli researchers show how to steal data through PC components
- Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?
- MIRCOP ransomware blames victim for attack, demands $28K ransom
- CYBERCOM 'reluctant' to cut off Islamic State internet
- Chinese tech professional caught selling secrets
- How 154M U.S. voter records will affect Americans' security - industry reacts