Cloud Security

Bb41d7ba746e551cbae52d2aaab4f625

What Is Your Security Canary?

April 13, 2017 Added by:Jesse McKenna

Although traditional anti-malware approaches tend to focus on looking deep within each endpoint for suspicious activity, in the case of ransomware particularly, this equates to monitoring the coal miners and when an event happens, you’ve just lost a miner.

Comments  (0)

8a958994958cdf24f0dc051edfe29462

Cybersecurity Industry Must Adopt Cyberdefense Tech that Utilizes Analytics, Artificial Intelligence

April 06, 2017 Added by:Larry Karisny

The cyberdefense industry needs to quit playing catch-up and having a reactionary approach to cybersecurity.

Comments  (0)

C33ba283f54a267b479325c67e2ea466

4 Things that Make Cloud Compliance Harder Than You Think

April 06, 2017 Added by:John Martinez

There are some factors to take into consideration that may make compliance in the cloud a bit more challenging

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Security Policies Matter for Disaster Recovery

March 02, 2017 Added by:Avishai Wool

Prevention is no longer enough to ensure robust readiness to unplanned incidents and cyber threats. Organizations also need to ensure that their incident response is as slick and unified as possible.

Comments  (0)

33e341295f31dc98f191961ddd26bcba

When Ransomware Strikes: Does Your Company Have a Data Disaster Recovery Plan?

February 16, 2017 Added by:Jeff Erramouspe

Ransomware is rampant and those who commit the attacks aren’t discriminating against any industry, company size, or company location.

Comments  (0)

E61bd0e5d76b76868ffe7b6574f67796

Top 10 Cloud and Security Predictions for 2017

December 14, 2016 Added by:Shehzad Merchant

In the coming year, we might see a number of significant changes with respect to both the public cloud and information security.

Comments  (0)

18d2ccc39431a1f63d67dd3252263400

The Hidden Security Risks of Cloud APIs

December 02, 2016 Added by:Sam Rehman

With the inherent security flaws taken care of, cloud software can take full advantage of the benefits of APIs without exposing themselves or their clients to attack.

Comments  (0)

C834d47d31dd1a1b3371bda639105c59

Winter Is Coming: Forget the Firewall and Layer Up

October 25, 2016 Added by:Myk Konrad

With the holidays around the corner, bundling up on security is the best thing you can do to protect your revenue from the cold realities of cybercrime.

Comments  (0)

2271632958e3e89d01a458efe5e003bd

Minimize “Dwell Time” to Cut the Cost of Data Center Breaches

October 20, 2016 Added by:Dave Burton

If enterprises are serious about curtailing the cost of data breaches, it’s time to shift their focus to one of the chief culprits driving up the cost of breaches: dwell time.

Comments  (0)

41d5440f596e714d7ca33eccabc5fcab

Automating Access May Be Best for Remote Users

September 21, 2016 Added by:Dean Wiech

When you are working remotely, things need to be very convenient, otherwise it becomes a huge aggravation of dealing with technical issues before you can get anything for work or school completed.

Comments  (0)

0133c663c244df033c2eeb2248dfee32

What Elements Are Needed for Security Analytics Success?

August 23, 2016 Added by:Mike Paquette

Not all security analytics solutions are created equal. There are five key characteristics critically important to ensuring that your security analytics are effective and capable of stopping today’s advanced threats.

Comments  (0)

8e3215d0f18771cb3287f2123ffb2cdc

What the Auto Industry Can Learn from Payments Sector about Cybersecurity

August 17, 2016 Added by:Johannes Lintzen

An established Root of Trust, combined with industry standards like those adopted by the payments industry and ongoing dialogues among leaders in the field, will ensure the automotive industry stays ahead of security risks associated with connected vehicles.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Palo Alto Networks Webinar: Five Steps to a Secure Hybrid Architecture

July 25, 2016 Added by:InfosecIsland News

SecurityWeek and Palo Alto Networks will host a live network security webinar on Wednesday, July 27th at 1:00PM ET: Five Steps to a Secure Hybrid Architecture.

Comments  (0)

591c39c65cf5c298ccd0f1cd5818e961

Cloud Security Can’t Be Ignored Anymore, Thanks to Millennials

May 09, 2016 Added by:Vanishree Rao

Thanks to digital preferences of millennials, increased digitization and cloudification will drive the demand for cloud security products and services.

Comments  (0)

37b77b2d6c99c432123b1b46fa64e566

The Role of CASBs in Protection Against the 2016 “Treacherous 12"

May 03, 2016 Added by:Ganesh Kirti

We looked at how well CASBs would fare in helping enterprises survive the treacherous 12 and guess what? CASBs clearly address nine of the treacherous 12 (along with many other risks not mentioned in the report).

Comments  (0)

0691ab2a89db6dae5b9845dee3dd63a4

Cloud Email Applications Could Put Your Corporate Data at Risk

April 12, 2016 Added by:Yotam Gutman

Third party email cloud application could expose the organizations data since employees now have the ability to grant applications access to their corporate information

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »