Cloud Security

Cloud security news, trends, analysis and practical advice

cloud security

01 intro

5 things DevOps must do to secure containers

Aqua’s CTO, Amir Jerbi suggests some key things DevOps should know about securing containerized applications.

sonicwall ceo bill conner
Q&A

SonicWall CEO talks of life after Dell spinout

In this installment of the IDG CEO Interview Series, Bill Conner spoke with Chief Content Officer John Gallant about what the Dell spin out means for customers and where SonicWall is focusing its development efforts.

email thinkstock

Emails, politics and common sense

Like many Americans, I've been trying to explain and justify the 2016 election cycle. I am not an expert political scientist. I am a software engineer. The question I ask myself is "What role did computer technology play in this...

cloud question mark confusionjpg

How not to announce a company launch

I receive dozens of press releases every day. They're hard to write well, and this launch shows that.

privacy please

Don't trust your cloud service until you've read the terms

Customers shouldn't just click "Accept" when presented with a license or terms of service agreement. It is important to read and understand what they agree to.

01 intro

9 data security tips for cloud migration

For organizations considering cloud migration, here are nine proactive steps that companies can take to ensure a smooth transition and get tighter cloud security.

New features in Windows 10 laptop

Respect: Windows 10's security impresses hackers

Windows is a popular attack target for criminals and researchers alike, but Microsoft has done a good job of making it harder to target security flaws in the OS

cloud security decisions

What is a cloud access security broker and why do I need one?

These products provide a variety of security measures, including access control, firewall, identity management, anti-malware, DLP, encryption and threat management.

game of thrones

Game of Thrones can teach valuable security lessons

With new hacking techniques, malware, viruses and threats being created faster than Melisandre’s demon babies, the web is indeed dark and full of terrors. Here are seven lessons for security managers pulled straight out of Westeros. ...

insider threat

Review: New tools to fight insider threats

An entire industry has sprung up to provide a defense against insider threats. We tested products from Fortscale, Avanan, and PFU Systems, with each one concentrating on a different aspect of the problem.

Spotify hack accounts leak

Spotify hacked? Angry users fight to regain accounts

News reports report news of Spotify hack -- there seem to have been many users' account details leaked on Pastebin. But the Swedish streaming service says all is safe, rather implying it's users are the ones at fault...

BlackBerry RCMP

BlackBerry bangs final nail in coffin, lets Mounties hack you

BlackBerry gave up its global encryption key to the Royal Canadian Mounted Police. That's the conclusion of commentators who've dissected CEO John Chen's vapid statement on the matter...

WhatsApp Encryption

WhatsApp encryption -- egg on Hillary's face

WhatsApp's encryption job is done -- says the billion-user messaging app team. It was helped by Open Whisper Systems, the crypto-heads behind the Signal system, which is what WhatsApp's app now uses for its end-to-end wonderousness...

smartphone encryption

MIT, Harvard researchers push new way for users to control access to personal data

Cryptography researchers at MIT and Harvard have developed software called Sieve that is designed to help users keep track of encrypted personal data and better manage it in the cloud.

fraud infog primary

2015: The year in security, identify theft and fraud

There’s a lot we can say about cybersecurity, identify theft and fraud in 2015, but we’re going to let our infographic tell the story.

cloud security ts

Public cloud vs. on-premises: Which is more secure?

As the market continues to mature in 2016, organizations are more willing than ever to use cloud-based services. But questions about security remain. The great debate of whether public cloud or on premises infrastructure is more...

Twitter state-sponsored hack

Oh noes: Twitter tells of “state actor” hack on tweeps (this is what you should know)

Some Twitter users may have been hacked by the government. Or “a” government—we don’t know which and Twitter isn’t saying. Not even Del Harvey, head of Twitter’s Trust & Safety team (pictured)...

cybersecurity ts

Some scary (for some) statistics around file sharing usage

Cloud is big. File sharing is massive. Recent statistics show just how big and massive those things are.

Load More