Cloud Security

Cloud Security | News, how-tos, features, reviews, and videos

blockchain ecosystem

5 ways blockchain is the new business collaboration tool

While the full potential of blockchain may not be understood by business execs, that's not keeping companies from aggressively exploring how the secure, distributed ledger technology can save time and money.

blockchain challenge

Microsoft wants to use blockchain to secure your identity

Microsoft plans to pilot a blockchain-based digital ID platform that would allow users to control access to sensitive online information via an encrypted data hub.

net neutrality

Will the end of net neutrality be a security nightmare?

Effects of the net neutrality repeal are hard to predict, but there could be additional costs for using endpoint security tools if data rates rise. Best advice: Stay the course on security for now.

cyber attack virus meltdown

How bad are Meltdown and Spectre?

Some people aren't taking hardware vulnerabilities like Meltdown and Spectre seriously. Here's a point-by-point rebuttal to their arguments.

Broken window with band-aid patch

Meltdown and Spectre patches: Where to start and what to expect

You need to apply Meltdown and Spectre patches to pretty much everything in your enterprise. And you need to start now. We help you prioritize.

cyber security

What is cyber security? How to build a cyber security strategy

Organizations face many threats to their information systems and data. Understanding all the basic elements to cyber security is the first step to meeting those threats.

artificial intelligence / machine learning

AWS raises machine learning expectations for cloud security

AWS's new GuardDuty and Macie offerings unleash the power of machine learning to secure your data. Are they right for your enterprise?

state of infosec 2018 intro

Information security, 2018: What we have here is a failure to plan

Information security increasingly has a place in corporate leadership, but plenty of companies are still failing to make the plans they need to keep up.

bos17 networking security lg

Bossie Awards 2017: The best networking and security software

InfoWorld picks the top open source software for protecting networks and their users

cloud security

90% Off This Cloud Technology Security Knowledge Certification Prep Bundle - Deal Alert

This course will provide you with a thorough understanding of cloud computing, its security challenges, and the ways you can mitigate risks of attack.

cloud security ts

Amazon Macie automates cloud data protection with machine learning

Amazon promises AWS S3 customers that they will be able to identify and protect sensitive data faster with Macie, but is it enough to catch up to what Microsoft and Google offers?

Alert Logic CEO Gray Hall

Security-as-a-service supplier Alert Logic started with IDS and blossomed from there

CEO Gray Hall shares insights into what customers are using, where the industry is going

chair spotlight

How CISOs can answer difficult questions from CEOs

A hypothetical conversation can become all too real, and hopefully you are prepared with the answers. Here is a script to help get you started.

0 attack

How to counteract another ‘Dyn-like’ attack

Jim Hurley, a Distinguished Analyst at technology research and advisory firm ISG, shares his insights on what enterprises using cloud-based as-a-services can do to work with their providers and reduce risks to their business from...

cloud security

Cloud security startup RedLock automates public-cloud protection

Cloud security startup RedLock comes out of stealth mode today with a service that helps defend business resources that reside in pubic clouds, gives customers visibility into how these resources are being used and stores records of...

1 transform phone payment

10 ways Trusted Identities are used

It is always a struggle to control who gets into your network. A third-party might need access for the contractual work they are doing. HID Global runs through some ways trusted identities are used.

1 running back football

Top 10 ways to achieve agile security

Find out how to enable developers to do what they wanted, when they wanted, as fast as they wanted

information security threat primary4

9 biggest information security threats through 2019

Each year, the Information Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its 'Threat Horizon' report to provide a forward-looking view of the biggest security...

disaster recovery button

Disaster recovery: How is your business set up to survive an outage?

Can your business get by with an asynchronous backup or must that offsite server be updated by the second to keep the business up and running at all times.

cloud security

Google tries to beat AWS at cloud security

New tools that protect enterprise applications running on Google Cloud Platform may help take the spotlight away from AWS and Microsoft Azure

Load More