Cloud Security

Cloud security news, trends, analysis and practical advice

fraud infog primary
cloud security ts

Twitter state-sponsored hack

Oh noes: Twitter tells of “state actor” hack on tweeps (this is what you should know)

Some Twitter users may have been hacked by the government. Or “a” government—we don’t know which and Twitter isn’t saying. Not even Del Harvey, head of Twitter’s Trust & Safety team (pictured)...

cybersecurity ts

Some scary (for some) statistics around file sharing usage

Cloud is big. File sharing is massive. Recent statistics show just how big and massive those things are.

security analytics

How the NSA uses behavior analytics to detect threats

The CIO of the National Security Agency says analytics protect the U.S. intelligence community’s private cloud system from internal and external threats.

Social Privacy Authentication

OAuth 2.0: The protocol at the center of the universe

Public APIs are becoming a crucial business asset. A strong API strategy depends on openness and standardization. A support for the OAuth 2.0 specification is the first step towards a successful and secure API model.

FBI CISO Arlette Hart

U.S. government wants in on the public cloud, but needs more transparency

The federal government is trying to move more into the cloud, but service providers' lack of transparency is harming adoption, according to Arlette Hart, the FBI's chief information security officer.

nadella security

New Microsoft Azure cloud security tools will work on premises, in Amazon’s cloud too

Microsoft CEO Satya Nadella says the company’s infrastructure security tools will protect not only the company's IaaS Azure public cloud, but customer environments and even those from competitors like Amazon Web Services.

florida east coast railway and portmiami

Are the container wars back again? CoreOS and Docker roll out container security offerings

Last year we saw a battle-royal arise between competing container formats. A ceasefire was negotiated, but does this week see a resumption of hostilities?

cybersecurity ts

Heat map to pinpoint where burning need is for cybersecurity pros

The National Institute of Standards and Technology is funding creation of a heat map visualization tool that will show where cybersecurity jobs are open across the country. The first rendition should be out late next year.

video

Ellison: Oracle has fixed security

Oracle Chairman Larry Ellison has put better security at the heart of his pitch for the company's new products.

cancelling an it project

Intel Security to discontinue McAfee SaaS products

Some products will be replaced, but admins will need to start over for setup and configuration.

werner vogels aws amazon

IT departments must transform in the face of the cloud revolution

Cloud computing democratizes developer and end user productivity at the expense of transparency and IT control. Since developers and users are able to provision and utilize resources as needed, it is easy for costs, overall...

cloud security ts

Why you shouldn’t trust cloud service providers

It’s hard enough really trusting your own employees these days. So when it comes to employees of cloud service providers, columnist Rob Enderle writes you definitely shouldn’t trust them.

Eye-catching cloud solutions

Application attacks against clouds up 45%

Application attacks against clouds jumped 45 percent last year, according to a new report

aws invent panel

5 tips on cloud migration from those who know (with video)

For enterprises considering a move to the cloud, or even in the middle of a move right now, the transition can be daunting. But veterans who've been there can help you steer around the pitfalls.

cloud data center

Security risks increase as cloud data centers change

Change is always risky. Fast change is even riskier, leaving less time for change management and checks on changed technologies.

ECJ Facebook safe harbor privacy

European Court kills Safe Harbor -- Panic at Facebook and other cloud firms

Europe has killed the Safe Harbor agreement. At a stroke, Facebook and more than 4,000 other companies can no longer legally move personal data from Europe to the USA...

car wireless internet security privacy security locks 100437820 primary.idge

Study names the five most hackable vehicles

A forensic research firm has published a list of the industry's most hackable and least hackable vehicles based on how easy it is to wirelessly access their computerized systems.

Locking the

Microsoft hopes to strengthen cloud security with latest acquisition

Microsoft has acquired security company Adallom in a bid to give IT departments more control over application access as well as data stored across cloud services.

Load More