cloud security
Radware launches cloud-based DDoS attack mitigation system
At RSA Conference 2013 in San Francisco, Radware announced DefensePipe, an integrated and comprehensive solution to help mitigate volumetric DDoS attacks which threaten to …
Qualys and Verizon join forces for new IT security and compliance solutions
Qualys and Verizon announced an agreement to expand their relationship to deliver new advanced cloud-based IT security and compliance management services to organizations …
Big Data cloud solutions powered by open source analytics database
At RSA Conference 2013 in San Francisco, Virtustream announced it has partnered with Metamarkets and Skilled Analysts to offer big data solutions in the cloud. There is a …
CloudLock unveils Community Trust Rating
CloudLock unveiled the Community Trust Rating as part of its Cloud Information Security Suite at RSA Conference 2013. The third-party application trust assessment system uses …
Qualys brings vulnerability management to Amazon EC2 and VPC
At RSA Conference 2013 in San Francisco, Qualys announced powerful new vulnerability management capabilities for Amazon EC2 and VPC customers using a QualysGuard connector …
Connect securely to the cloud using JSON and XMPP
At the RSA Conference 2013 in San Francisco, Express Logic and Cypherbridge Systems announced the integration of the Cypherbridge embedded secure Cloud Device Kit for Express …
A framework for building privacy-oriented apps
At the RSA Conference 2013 in San Francisco, SpiderOak announced it is launching privacy into the mainstream with the unveiling of Crypton, a “zero-knowledge” …
F5 Networks releases hybrid cloud solution for mobile application management
F5 Networks announced F5 Mobile App Manager, a new hybrid cloud solution for mobile application management that enables organizations to safely support enterprise BYOD …
Cloud computing in critical information infrastructure protection
ENISA has launched a new report looking at cloud computing from a Critical Information Infrastructure Protection (CIIP) perspective, and identifying that cloud computing is …
Opportunistic scanning from cloud to endpoint
iScan Online introduces opportunistic security scanning from the cloud to any device. They perform internal PAN, PCI and Vulnerability scanning without installing software or …
PCI DSS cloud computing guidelines
The PCI Security Standards Council (PCI SSC) published the PCI DSS Cloud Computing Guidelines Information Supplement, a product of the Cloud Special Interest Group (SIG). …
Fear of government snooping hinders cloud adoption
Almost half of IT experts are deterred from keeping sensitive data in the cloud because of fear of government intervention and possible legal action, according to Lieberman …
Featured news
Resources
Don't miss
- The AI safety conversation is focused on the wrong layer
- Critical NetScaler ADC, Gateway flaw may soon be exploited (CVE-2026-3055)
- GitHub-hosted malware campaign uses split payload to evade detection
- Measuring security performance in real-time, not once a quarter
- Attackers are handing off access in 22 seconds, Mandiant finds