Please turn on your JavaScript for this page to function normally.
Exostar updates identity management solution

Exostar, whose cloud-based solutions enable secure business-to-business collaboration, announced it has expanded its Managed Access Gateway (MAG) identity management service …

Key security threats in the coming year

The widespread adoption of mobile devices, proliferation of applications and growth of cloud computing are helping accelerate business innovation and social benefits. However, …

Cloud computing certification

With the use of cloud computing expanding and the demand for IT workers with cloud skills growing, CompTIA introduced a new specialty certification focused on cloud computing …

CloudVerse: Cloud management framework

Cisco introduced CloudVerse, a framework that combines the foundational elements needed to enable organizations to build, manage and connect public, private and hybrid clouds. …

Cloud computing traffic to grow 12-fold by 2015

Cisco estimates global cloud computing traffic will grow 12-fold from 130 exabytes to reach a total of 1.6 zettabytes annually by 2015, a 66 percent compound annual growth …

Cyber security trends for financial services in 2012

Booz Allen Hamilton today cited increased cyber threats to senior executives, the impact of organized crime and mobile device security as among the top 10 financial services …

Does risk outweigh the benefits from the cloud?

Cloud computing provides organizations with an alternative way of obtaining IT services and offers many benefits including increased flexibility as well as cost reduction. …

nCircle PureCloud: Network security scanning service

nCircle announced PureCloud, a network security scanning service which combines security technology used by thousands of the world’s largest enterprises and government …

Top requirements for operating data in the cloud

The Cloud Security Alliance (CSA) Cloud Data Governance (CDG) working group today introduced the results of its Cloud Consumer Advocacy Questionnaire and Information Survey. …

CSA offers a practical road map for secure cloud adoption

The Cloud Security Alliance (CSA) today unveiled the third version of its Security Guidance for Critical Areas of Focus in Cloud Computing. This effort provides a practical, …

Cloud security best practices and tips

With the adoption of cloud computing continuing to accelerate, the need to adopt and maintain effective security and compliance practices is more important that ever. To help …

Forensics for advanced threat activity

Damballa announced Failsafe 5.0, a solution that hunts for undetected threats by correlating a variety of observed network behaviors that indicate malware-infected devices …

Don't miss

Cybersecurity news