Small and midsize businesses will continue implementing cloud services, perhaps jumping to a quarter of all security spending by 2016, according to a soon-to-be-released report.
Given the cost benefits, security pros likely can do little to stop their organization from migrating to the cloud. That's why they must do all they can to control the risk.
As cloud computing evolves, security strategies must address load, perimeter and behind-the-firewall protection, as well as availability.
Symantec has acquired LiveOffice, a privately held cloud-based archiving provider, for approximately $115 million.
Apple on Wednesday issued much-anticipated updates for its Mac OS X and iOS mobile operating system, adding support for its new iCloud service, and fixing a bevy of security flaws.
When Steve Jobs announced iCloud at the Apple Worldwide Developer Conference, many in enterprise IT dismissed the broader relevance of consumer cloud services, but they do so at their peril.
Amazon's Simple Storage Service (S3) is being used to host malicious sites distributing the nefarious banking trojan.
The Cloud Security Alliance is planning to develop and maintain a public registry documenting the security controls that exist in various cloud computing offerings.
With more organizations hesitant to entrust their sensitive data to the cloud and a handful of high-profile breaches, providers are augmenting their protections capabilities.
Amazon's outage should serve as a reminder that relying on the cloud for server space can have a business impact if something goes amiss.
Cloud/security knowledge is in demand within such professions as network engineer, solutions architect, sales engineers and sales manager.
A plan aimed at streamlining efficiencies in the federal government's use of IT technologies is making its way toward a hearing on Capitol Hill on April 12.
The rapid shift in technology requires a major re-think of how we deploy security.
Attackers - whether motivated by financial gain or a terrorist agenda - are changing their game and sharpening their focus.
Security practitioners are working to safeguard cloud computing environments but believe they need more education and training, according to a soon-to-be released study conducted by analyst firm Frost & Sullivan.
Network security provider Sourcefire on Wednesday announced the acquisition of cloud-based anti-malware start-up Immunent for $21 million. The acquisition expands Sourcefire's portfolio by adding a cloud platform for the delivery of malware protection and extending the company's existing intrusion detection and prevention technologies into the cloud. Immunent, founded in July 2008, serves more than 750,000 users in 192 countries. Sourcefire will retain all full-time Immunent employees, including founders Oliver Friedrichs, Alfred Huger and Adam O'Donnell. - AM
Dell announced on Tuesday that it has signed a definitive agreement to acquire SecureWorks, an Atlanta-based information security service provider.
Less than half of Canada's small businesses use cloud-based computing services, according to a new survey.
Internet security firm Webroot on Monday announced that it has acquired cloud-based, anti-malware solutions provider Prevx for an undisclosed sum. U.K.-based Prevx uses behavior-based malware detection to protect consumer and business customers from malware, including zero-day exploits. Boulder, Colo.-based Webroot plans to integrate Prevx's technology into its cloud security services. This is the second cloud acquisition Webroot has made this year, after picking up website classification company BrightCloud in July. — AM
Continuing its cloud computing buying spree, IT management software provider CA Technologies announced Monday that it plans to acquire authentication solutions provider Arcot for $200 million.
Adopting cloud-based services gives organizations many benefits, but it also opens them up to many risks and vulnerabilities, says Fortinet's Anthony James.
Sign up to our newsletters
SC Magazine Articles
- Study: Open Source Software use increasing in enterprises but without vulnerability monitoring
- RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns
- 'Aaron's Law' returns to Congress
- RSA 2015: Tension continues to grow between govt, cryptographers
- Data at risk for 9,000 individuals following unauthorized access to SRI Inc. website
- Study: Conficker declared top threat of 2014, but N. America targeted mainly by AnglerEK
- RSA 2015: Straight talk about encryption, bulk surveillance and IoT
- RSA 2015: In the healthcare industry, security must innovate with business
- RSA 2015: Unintended use of aircraft systems next challenge for counterterrorism community
- RSA 2015: Bug hunting and responsible vulnerability disclosure