Cloud Security

Cloud security news, trends, analysis and practical advice

01 intro
New features in Windows 10 laptop

cloud security decisions

What is a cloud access security broker and why do I need one?

These products provide a variety of security measures, including access control, firewall, identity management, anti-malware, DLP, encryption and threat management.

game of thrones

Game of Thrones can teach valuable security lessons

With new hacking techniques, malware, viruses and threats being created faster than Melisandre’s demon babies, the web is indeed dark and full of terrors. Here are seven lessons for security managers pulled straight out of Westeros. ...

insider threat

Review: New tools to fight insider threats

An entire industry has sprung up to provide a defense against insider threats. We tested products from Fortscale, Avanan, and PFU Systems, with each one concentrating on a different aspect of the problem.

Spotify hack accounts leak

Spotify hacked? Angry users fight to regain accounts

News reports report news of Spotify hack -- there seem to have been many users' account details leaked on Pastebin. But the Swedish streaming service says all is safe, rather implying it's users are the ones at fault...

BlackBerry RCMP

BlackBerry bangs final nail in coffin, lets Mounties hack you

BlackBerry gave up its global encryption key to the Royal Canadian Mounted Police. That's the conclusion of commentators who've dissected CEO John Chen's vapid statement on the matter...

WhatsApp Encryption

WhatsApp encryption -- egg on Hillary's face

WhatsApp's encryption job is done -- says the billion-user messaging app team. It was helped by Open Whisper Systems, the crypto-heads behind the Signal system, which is what WhatsApp's app now uses for its end-to-end wonderousness...

smartphone encryption

MIT, Harvard researchers push new way for users to control access to personal data

Cryptography researchers at MIT and Harvard have developed software called Sieve that is designed to help users keep track of encrypted personal data and better manage it in the cloud.

fraud infog primary

2015: The year in security, identify theft and fraud

There’s a lot we can say about cybersecurity, identify theft and fraud in 2015, but we’re going to let our infographic tell the story.

cloud security ts

Public cloud vs. on-premises: Which is more secure?

As the market continues to mature in 2016, organizations are more willing than ever to use cloud-based services. But questions about security remain. The great debate of whether public cloud or on premises infrastructure is more...

Twitter state-sponsored hack

Oh noes: Twitter tells of “state actor” hack on tweeps (this is what you should know)

Some Twitter users may have been hacked by the government. Or “a” government—we don’t know which and Twitter isn’t saying. Not even Del Harvey, head of Twitter’s Trust & Safety team (pictured)...

cybersecurity ts

Some scary (for some) statistics around file sharing usage

Cloud is big. File sharing is massive. Recent statistics show just how big and massive those things are.

security analytics

How the NSA uses behavior analytics to detect threats

The CIO of the National Security Agency says analytics protect the U.S. intelligence community’s private cloud system from internal and external threats.

Social Privacy Authentication

OAuth 2.0: The protocol at the center of the universe

Public APIs are becoming a crucial business asset. A strong API strategy depends on openness and standardization. A support for the OAuth 2.0 specification is the first step towards a successful and secure API model.

FBI CISO Arlette Hart

U.S. government wants in on the public cloud, but needs more transparency

The federal government is trying to move more into the cloud, but service providers' lack of transparency is harming adoption, according to Arlette Hart, the FBI's chief information security officer.

nadella security

New Microsoft Azure cloud security tools will work on premises, in Amazon’s cloud too

Microsoft CEO Satya Nadella says the company’s infrastructure security tools will protect not only the company's IaaS Azure public cloud, but customer environments and even those from competitors like Amazon Web Services.

florida east coast railway and portmiami

Are the container wars back again? CoreOS and Docker roll out container security offerings

Last year we saw a battle-royal arise between competing container formats. A ceasefire was negotiated, but does this week see a resumption of hostilities?

cybersecurity

Heat map to pinpoint where burning need is for cybersecurity pros

The National Institute of Standards and Technology is funding creation of a heat map visualization tool that will show where cybersecurity jobs are open across the country. The first rendition should be out late next year.

video

Ellison: Oracle has fixed security

Oracle Chairman Larry Ellison has put better security at the heart of his pitch for the company's new products.

Load More