CLOUD SECURITY

Much of modern computing is done outside corporate firewalls, and nowhere is the security challenge greater than in the cloud. As cloud computing grows in importance, so does your need to stay informed of the best practices and security technologies that can keep your data safe in the cloud.

LATEST CLOUD SECURITY ARTICLES

What Security can Learn from Indy Car/F1 Racing #Dockercon

|

At DockerCon EU, Docker Security lead explains that what's needed to improve security is more safety.

READ MORE

What's the Most Secure Container Orchestrator, Kubernetes or Docker Swarm?

|

VIDEO: Dino Dai Zovi, security researcher and CTO of Capsule8, details security concerns in container orchestration systems.

READ MORE

Secure AWS Now: PHM Medical Records, Accenture Data Exposed Online

|

Publicly accessible Amazon S3 buckets continue to expose a disturbing amount of sensitive data.

READ MORE

ShiftLeft Raises $9.3 Million, Exits Stealth Mode

|

The security startup creates custom security agents for each new build of cloud applications as fast as developers can deliver them.

READ MORE

53 Percent of Organizations Using the Cloud Have Exposed Data Online

|

That's a significant leap from 40 percent six months ago, according to a recent study.

READ MORE

TOP CLOUD SECURITY RESOURCES

CLOUD SECURITY BEST PRACTICES

11 best practices for enterprises using a public cloud.

READ MORE

CLOUD ACCESS SECURITY BROKERS (CASB)

More companies are moving sensitive data to the cloud, increasing the need to secure that data.

READ MORE

MANAGED SERVICES

We look at security issues posed by managed services, and the shortcut to comprehensive IT security that managed security services providers offer.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

TLS/SSL: Be Wary of What Travels Inside

Encrypted web communication routinely bypasses enterprise security controls. Left unscanned, these channels are perfect vehicles for hiding infection, command & control, and data..

TLS/SSL: Where Are We Today?

Encryption keeps data confidential, but we're left unprotected from threats that may be embedded in the data. In fact, encryption actually conceals these threats and adds network...

Breach Detection Systems: Product Selection Guide

Breach detection systems (BDS) are security products that offer timely detection of threats. When evaluating these products, customers must take into account traditional factors, such...

Advanced Endpoint Protection: When Should an Enterprise Move to AEP?

Advanced endpoint protection (AEP) products are still relatively immature, which makes it difficult to decide whether to replace or augment existing endpoint protection (EPP). Adding...

Advanced Endpoint Protection: Strategic Guidance

Replacing traditional antivirus (AV) with advanced endpoint protection (AEP) products may not be the best decision for every organization. If you do decide to switch, determining...
 
SEE ALL WHITEPAPERS
 
VIPRE Cloud Brings Machine Learning to Next-Generation Anti-Malware

VIPRE Cloud Brings Machine Learning to Next-Generation Anti-Malware

|

The latest iteration of VIPRE Cloud calls on the power of AI to deliver a comprehensive anti-malware system that eliminates many of the shortcomings of on-premise data security solutions.

READ MORE
Larry Ellison Promises Oracle Autonomous Security Technology

Larry Ellison Promises Oracle Autonomous Security Technology

|

How do you avoid becoming the next Equifax data breach? Oracle founder Larry Ellison figures you have to take humans out of the equation.

READ MORE
Managed Security Service Providers (MSSPs): Making IT Security Easier

Managed Security Service Providers (MSSPs): Making IT Security Easier

|

IT security is one of the hardest challenges an organization faces. A managed security service provider (MSSP) can help - and save on costs. We tell you what an MSSP is and how to evaluate one.

READ MORE
The Cloud Breach Epidemic: Verizon, Viacom the Latest to Leak Sensitive Data

The Cloud Breach Epidemic: Verizon, Viacom the Latest to Leak Sensitive Data

|

The data exposed in both leaks included login credentials providing access to the companies' internal networks.

READ MORE