Cloud Security

Cloud Security | News, how-tos, features, reviews, and videos

Computerworld > Mobile voting via Voatz phone app
ibm cloud lab

network endpoint connections / synapses

Review: CrowdStrike Falcon breaks the EDR mold

The biggest differentiator with Falcon is that the brains of the platform exist completely in the cloud, which gives it unlimited scalability as well as a massive footprint of users and enterprises.

google cloud services

Google expands cloud security capabilities, including simpler configuration

New tools and services will help make it easier for enterprises to manage security with Google products as well as with Amazon and in their own private clouds and applications.

CSO Digital Magazine, Spring 2019

CSO50 2019: Seeding security in the cloud

CSO50 award-winning companies are rising to the cloud security challenge and finding new ways to protect data and assets.

cloud security data breach crime accessible

SoftNAS Cloud 0day found: Upgrade ASAP

SoftNAS Cloud users should upgrade immediately following a report by Digital Defense that the virtual cloud appliance is vulnerable to a session management security issue.

rocket launch startup cloud success growth

12 of the hottest startups at the RSA Conference 2019

These RSAC Early Stage Expo startups bring fresh cybersecurity solutions to fight phishing, improve application security, provide better cloud protections, enforce security policy, more accurately authenticate and more.

10 cloud security breach virtualization wireless

Multi-vector attacks target cloud-hosted technologies

Securonix report outlines the threat posed by automated multi-vector, multi-platform attacks against cloud infrastructure.

network security digital internet firewall binary code

What are next generation firewalls? How the cloud and complexity affect them

Nextgen firewalls add features like behavioral analytics, malware detection, and content monitoring to prevent unauthorized access and data exfiltration. They could do much more in the future.

1 intro security executive thinking woman face binary

12 things every IT security professional should know

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know.

10 cloud security breach virtualization wireless

What are Amazon Zelkova and Tiros? AWS looks to reduce S3 configuration errors

Amazon’s latest tools help identify where data might be left exposed in your AWS S3 cloud environments.

external url

24 best free security tools

Check out these 24 free, standout software tools that will make your daily security work easier.

blockchain bitcoin circuitry global

Blockchain will be the killer app for supply chain management in 2018

The distributed ledger technology that underpins cryptocurrencies is now poised to disrupt supply chain management – especially in the global shipping industry.

01 hot products at rsa 2018

Hottest cybersecurity products at RSA 2018

Here's a quick run-down of some of the new products announced at the conference, or shown there for the first time.

Adobe’s CSO talks security, the 2013 breach, and how he sets priorities

Brad Arkin has led Adobe's new approach to security and aims to make sure one of history’s biggest data breaches doesn’t happen again.

social media multiple logos

Reputational risk and social media: When you're blocked or banned without notice

Businesses depend on sites like Facebook, Twitter, Dropbox, and Apple to interact with customers, promote their messages and store content. One complaint against you can shut you off from those services and damage your brand.

Government building with greek columns

What is FedRAMP? How cloud providers get authorized to work with the U.S. government

The process for getting the FedRAMP seal of approval is complex, but it can ultimately be lucrative for companies that meet the security requirements.

cloud network blockchain bitcoin storage

Blockchain and cryptocurrency may soon underpin cloud storage

Emerging now: P2P networks that use blockchain to manage cloud storage based on the sharing of excess drive and network capacity on PCs and in data centers. Those who share capacity get free storage – and can be paid in cryptocurrency....

blockchain ecosystem

5 ways blockchain is the new business collaboration tool

While the full potential of blockchain may not be understood by business execs, that's not keeping companies from aggressively exploring how the secure, distributed ledger technology can save time and money.

blockchain challenge

Microsoft wants to use blockchain to secure your identity

Microsoft plans to pilot a blockchain-based digital ID platform that would allow users to control access to sensitive online information via an encrypted data hub.

Load More