Cloud Security

Cloud security news, trends, analysis and practical advice

disaster recovery button
large public cloud

rsa conference 2017

RSA Conference is a timesaver

For our manager, the annual security gathering is a great way to get quality time with vendors.

0 shadow it intro

8 steps to regaining control over shadow IT

Learn how to discover those employees who went roaming for outside services.

cloud security

IT leaders say it's hard to keep the cloud safe

IT managers are finding it difficult to keep their applications and data safe in the cloud, and many are slowing cloud adoption because of it, according to a report from Intel.

video

Cybersecurity and the Cloud in 2017

Infoworld Senior Writer Fahmida Rashid chats with Palo Alto Networks' CSO Rick Howard about the biggest cybersecurity challenges facing businesses working in the cloud in 2017.

01 intro

5 things DevOps must do to secure containers

Aqua’s CTO, Amir Jerbi suggests some key things DevOps should know about securing containerized applications.

sonicwall ceo bill conner
Q&A

SonicWall CEO talks of life after Dell spinout

In this installment of the IDG CEO Interview Series, Bill Conner spoke with Chief Content Officer John Gallant about what the Dell spin out means for customers and where SonicWall is focusing its development efforts.

email thinkstock

Emails, politics and common sense

Like many Americans, I've been trying to explain and justify the 2016 election cycle. I am not an expert political scientist. I am a software engineer. The question I ask myself is "What role did computer technology play in this...

cloud question mark confusionjpg

How not to announce a company launch

I receive dozens of press releases every day. They're hard to write well, and this launch shows that.

privacy please

Don't trust your cloud service until you've read the terms

Customers shouldn't just click "Accept" when presented with a license or terms of service agreement. It is important to read and understand what they agree to.

01 intro

9 data security tips for cloud migration

For organizations considering cloud migration, here are nine proactive steps that companies can take to ensure a smooth transition and get tighter cloud security.

New features in Windows 10 laptop

Respect: Windows 10's security impresses hackers

Windows is a popular attack target for criminals and researchers alike, but Microsoft has done a good job of making it harder to target security flaws in the OS

cloud security decisions

What is a cloud access security broker and why do I need one?

These products provide a variety of security measures, including access control, firewall, identity management, anti-malware, DLP, encryption and threat management.

game of thrones

Game of Thrones can teach valuable security lessons

With new hacking techniques, malware, viruses and threats being created faster than Melisandre’s demon babies, the web is indeed dark and full of terrors. Here are seven lessons for security managers pulled straight out of Westeros. ...

insider threat

Review: New tools to fight insider threats

An entire industry has sprung up to provide a defense against insider threats. We tested products from Fortscale, Avanan, and PFU Systems, with each one concentrating on a different aspect of the problem.

Spotify hack accounts leak

Spotify hacked? Angry users fight to regain accounts

News reports report news of Spotify hack -- there seem to have been many users' account details leaked on Pastebin. But the Swedish streaming service says all is safe, rather implying it's users are the ones at fault...

BlackBerry RCMP

BlackBerry bangs final nail in coffin, lets Mounties hack you

BlackBerry gave up its global encryption key to the Royal Canadian Mounted Police. That's the conclusion of commentators who've dissected CEO John Chen's vapid statement on the matter...

WhatsApp Encryption

WhatsApp encryption -- egg on Hillary's face

WhatsApp's encryption job is done -- says the billion-user messaging app team. It was helped by Open Whisper Systems, the crypto-heads behind the Signal system, which is what WhatsApp's app now uses for its end-to-end wonderousness...

smartphone encryption

MIT, Harvard researchers push new way for users to control access to personal data

Cryptography researchers at MIT and Harvard have developed software called Sieve that is designed to help users keep track of encrypted personal data and better manage it in the cloud.

Load More