Cloud Security

Cloud security news, trends, analysis and practical advice


MS_Azure
video

What is Microsoft Azure Stack? | Tech Talk Ep 1

Learn the ins and outs of Microsoft's upcoming private cloud offering, Azure Stack, as editors discuss its expected benefits and drawbacks.

blockchain ecosystem

4 ways blockchain is the new business collaboration tool

While the full potential of blockchain is often not understood by business execs, that's not keeping companies from aggressively exploring how the secure, distributed ledger technology can save time and money.

FBI

FBI director floats international framework on encrypted data access

The FBI director James Comey is suggesting an international approach to solving the encryption debate. He proposes that the U.S. might work with other countries on a “framework” for creating legal access to encrypted tech devices.

disaster recovery button

Disaster recovery: How is your business set up to survive outages?

Can your business get by with an asynchronous backup or must that offsite server be updated by the second to keep the business up and running at all times.

large public cloud

Securing applications in the public cloud

In a 1990s-era data center, everything revolves around hardware and virtual machines. Monolithic applications are installed and run on servers. Servers themselves run in the private subnet (secure) or public (DMZ), and they have...

rsa conference 2017

RSA Conference is a timesaver

For our manager, the annual security gathering is a great way to get quality time with vendors.

0 shadow it intro

8 steps to regaining control over shadow IT

Learn how to discover those employees who went roaming for outside services.

cloud security

IT leaders say it's hard to keep the cloud safe

IT managers are finding it difficult to keep their applications and data safe in the cloud, and many are slowing cloud adoption because of it, according to a report from Intel.

video

Cybersecurity and the Cloud in 2017

Infoworld Senior Writer Fahmida Rashid chats with Palo Alto Networks' CSO Rick Howard about the biggest cybersecurity challenges facing businesses working in the cloud in 2017.

01 intro

5 things DevOps must do to secure containers

Aqua’s CTO, Amir Jerbi suggests some key things DevOps should know about securing containerized applications.

Q&A

SonicWall CEO talks of life after Dell spinout

In this installment of the IDG CEO Interview Series, Bill Conner spoke with Chief Content Officer John Gallant about what the Dell spin out means for customers and where SonicWall is focusing its development efforts.

email thinkstock

Emails, politics and common sense

Like many Americans, I've been trying to explain and justify the 2016 election cycle. I am not an expert political scientist. I am a software engineer. The question I ask myself is "What role did computer technology play in this...

cloud question mark confusionjpg

How not to announce a company launch

I receive dozens of press releases every day. They're hard to write well, and this launch shows that.

privacy please

Don't trust your cloud service until you've read the terms

Customers shouldn't just click "Accept" when presented with a license or terms of service agreement. It is important to read and understand what they agree to.

01 intro

9 data security tips for cloud migration

For organizations considering cloud migration, here are nine proactive steps that companies can take to ensure a smooth transition and get tighter cloud security.

New features in Windows 10 laptop

Respect: Windows 10's security impresses hackers

Windows is a popular attack target for criminals and researchers alike, but Microsoft has done a good job of making it harder to target security flaws in the OS

cloud security decisions

What is a cloud access security broker and why do I need one?

These products provide a variety of security measures, including access control, firewall, identity management, anti-malware, DLP, encryption and threat management.

game of thrones

Game of Thrones can teach valuable security lessons

With new hacking techniques, malware, viruses and threats being created faster than Melisandre’s demon babies, the web is indeed dark and full of terrors. Here are seven lessons for security managers pulled straight out of Westeros. ...

Load More