cloud security
Tackling the growing web of data residency and privacy regulations
With an increasing number of companies moving to the cloud, we’ve seen a surge in investment by cloud providers to build international datacenters. While these …
1 in 5 employees going rogue with corporate data
Companies around the world have reason to be worried about the use of cloud applications to share mission-critical information. In fact, 1 in 5 employees has uploaded …
Cloud security: Do you know where your data is?
The rapid move towards virtualization and cloud infrastructure is delivering vast benefits for many organizations. In fact, Gartner has estimated that by 2016, 80% of server …
CSA Guide to Cloud Computing
Authors: Raj Samani, Brian Honan, Jim Reavis Pages: 236 Publisher: Syngress ISBN: 0124201253 Introduction The title says it all: this is a book that will tell you what cloud …
Trends in Internet trust exploits, IoT, cyber espionage and privacy
In the third quarter, McAfee Labs detected more than 307 new threats every minute, or more than five every second, with mobile malware samples growing by 16 percent during the …
Cost savings drive businesses to the cloud
A survey of C-Level senior executives, developers and other industry delegates has found that 72% of respondents identified cost as the key benefit of using the cloud for the …
How to detect fraudulent activity in a cloud without invading users’ privacy
A group of researchers have found a clever way for cloud providers to detect fraudulent activities in their clouds without actually probing into the kind of activity a user …
The context-aware security lifecycle and the cloud
Ofer Wolf is the CEO at Sentrix, a provider of cloud-based web security solutions. In this interview he talks about the challenges of delivering enterprise-grade security, …
Fighting malware, emerging threats and AI
Liran Tancman is the CEO of CyActive, a predictive cyber security company. In this interview he talks about fighting malware, emerging threats, artificial intelligence and the …
Secure file storage and sharing with nCrypted Cloud
The Ponemon Institute recently published a report stressing the fact that organisational leadership is failing to respond to the escalating risk of ungoverned file sharing …
Using security, cloud and Big Data to drive success
Dell surveyed more than 2,000 global organizations and found that security is the biggest concern in adopting cloud, mobility and Big Data. While 97 percent of organizations …
Over one-third of all enterprise data leakage policy violations occur on mobile devices
Nearly half of all cloud app activities and more than one-third of all data leakage policy violations occur on mobile devices, say the results of the October 2014 Netskope …
Featured news
Resources
Don't miss
- Researchers release tool to detect stealthy BPFDoor implants in critical infrastructure networks
- AI SOC vendors are selling a future that production deployments haven’t reached yet
- A nearly undetectable LLM attack needs only a handful of poisoned samples
- Your facilities run on fragile supply chains and nobody wants to admit it
- LiteLLM PyPI packages compromised in expanding TeamPCP supply chain attacks