Cloud Security

Cloud Security | News, how-tos, features, reviews, and videos

10 cloud security breach virtualization wireless
08 terror

cloud security ts

How to retrofit the cloud for security: 2 essential steps

You should build security into every enterprise-to-cloud migration. But if you didn’t do that, here’s how to reduce the risk after the fact

mind the gap sign

5 security gaps introduced by hybrid IT

As enterprises evolve towards more use of cloud infrastructure and services, it will become increasingly necessary to mind the security gaps between traditional and cloud environments

Israel Barak
video

Honeypots and the evolution of botnets | Salted Hash Ep 23

Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm's recent honeypot research, which gathered information showing how the bot landscape is evolving.

Hacking stealing password data

Why you should not worry about cross-tenant cloud attacks

The truth is that the defenses against attacks by other cloud users are strong, and there are much likelier risks you should be focused on instead

cssh 013.00 22 53 39.still001
video

DJI's bounty problems and video surveillance programs | Salted Hash Ep 13

Host Steve Ragan unpacks the latest news about Chinese company DJI's bug bounty program, plus new developments in video surveillance and more, with Fahmida Rashid.

Hacker in silouhette at laptop

Don’t leave your Amazon S3 buckets exposed

Although the default settings keep S3 data private, configuration errors have exposed data to the world. Even the NSA has screwed up

wide 2017.12.06 11.00.51.avi.11 21 57 57.still001
video

Zero Trust networks and enterprise security strategy | Salted Hash Ep 12

Executives at cloud services vendor Akamai -- David Lewis, global security advocate; Andy Ellis, CSO; and Charlie Gero, CTO -- talk with host Steve Ragan about the evolving role of security in the enterprise.

chick hatching egg

3 emerging cloud technologies for enterprise

Most enterprises manage more than 10,000—and that’s with only 20 percent of their workloads in the cloud. New cloud tech is emerging to help

Cloud computing security lock.

5 key observations on cloud-native security

Cloud-native security's meta policy around security layers allows the devops or cloud teams to operate it as seamlessly as possible

security incident responder

Centralized security in the cloud is the best security model

Sadly, enterprises don't like the idea of a central trust service in the cloud to secure both their cloud and local systems

bos17 networking security lg

Bossie Awards 2017: The best networking and security software

InfoWorld picks the top open source software for protecting networks and their users

cloud security ts

A better model for cloud security

How Bracket Computing uses full workload isolation to secure the hybrid cloud without disrupting developer workflow

cloud security

How cloud-native security can prevent modern attacks

Cloud-native security can prevent modern attacks. Here's why and how

secret

How to keep container secrets secret

Keeping secrets secret in container-based applications is complex and challenging, but far from hopeless

security software programmer primary

3 reasons cloud-native is the next evolution in enterprise security

Cloud-native is the next evolution for security in the enterprise, because it gives every organization the ability to use the same tools and processes used by modern fast-moving organizations, such as Airbnb, Google and Facebook. It’s...

cloud blueprint schematic

Attack and response: Cloud-native cybersecurity vs. virtual machine security

Securing containers and cloud-native workloads is different than securing virtual machines (VMs), and it all starts with understanding attack and response and the ever-evolving nature of threats.

Cloud_Security
video

Who's responsible for cloud security? | Tech Talk Pilot Episode, Pt 2

IDG editors talk about the common misperceptions about public cloud storage, including who's ultimately responsible for data security.

snake fang attack

The latest cyber attacks show why the cloud is safer

No major cloud provider has fallen victim to all the malware attacks of the last few years. What does that tell you?

Load More