Latest News

Cloud Computing

SANS Announces 2014 EMEA Schedule SANS Announces 2014 EMEA Schedule

The SANS Institute has released its latest training and events schedule for 2014 in the Europe, Middle East and Asia regions
03 March 2014

RSA Conference 2014: Celebrating Milestones, (ISC)² also Revamps its CISSP Exam RSA Conference 2014: Celebrating Milestones, (ISC)² also Revamps its CISSP Exam

As (ISC)² celebrates its 25th anniversary, the global non-profit is well underway to conducting the most extensive overhaul of the CISSP certification exam in its history. Infosecurity catches up with its executive director at the RSA Conference in San Francisco for a retrospective, and what to expect from the new certification exam
28 February 2014

RSA Conference 2014: Qualys Adds Cloud-based Continuous Monitoring and Web App Firewall RSA Conference 2014: Qualys Adds Cloud-based Continuous Monitoring and Web App Firewall

At this week's RSA Conference in San Francisco, Qualys has unveiled a pair of new security offerings meant to enhance companies’ cloud security profiles. Continuous monitoring capability is the most recent addition to its QualysGuard Cloud Platform, while QualysGuard Web Application Firewall (WAF) service is for web applications running in Amazon EC2 and on-premise.
27 February 2014

CSA Summit 2014: Using the Cloud to Protect Critical Infrastructure CSA Summit 2014: Using the Cloud to Protect Critical Infrastructure

By the end of 2014, more than half of all computing workloads will be processed by cloud based-services, based on data provided by Trend Micro’s JD Sherry. With much US-based critical infrastructure being operated by the private sector, there are both security risks and opportunities through leveraging the cloud
26 February 2014

Public Cloud Sharing Tools Are a Primary Security Risk Public Cloud Sharing Tools Are a Primary Security Risk

Organizations consider public cloud sharing tools as a primary security risk according to a survey of IT professionals conducted by Axway and Ponemon Institute.
25 February 2014

Putting Trust Into the Cloud: an EU/ENISA Project Putting Trust Into the Cloud: an EU/ENISA Project

Increased use of cloud computing in Europe could boost the economy by €100 billion and provide a net gain of 2.5 million jobs. But, says Neelie Kroes, "One of the obstacles to making the most of the cloud can be a lack of user trust; particularly about the security of systems (and for both individual users and businesses)."
25 February 2014

CSA Summit 2014: NSA Surveillance a Pre-cursor to Police State, Says Former US Cyber Czar CSA Summit 2014: NSA Surveillance a Pre-cursor to Police State, Says Former US Cyber Czar

The CSA Summit at this year’s RSA Conference kicked off with a keynote by Richard Clarke, former presidential advisor. Discussing the recent NSA surveillance controversy, the counter-terrorism and cybersecurity expert declared technology is currently available for the US government, and other nations around the world, “to create a ubiquitous, omniscient police surveillance state.”
24 February 2014

HP & AlienVault Use Threat Intelligence Sharing to Strengthen Defense HP & AlienVault Use Threat Intelligence Sharing to Strengthen Defense

Sharing threat intelligence is considered by both government and industry as essential to countering online criminality; but it seems that industry can move faster than government. This week, both AlienVault and HP are announcing separate information sharing initiatives; and both describe the issue in similar terms.
24 February 2014

BYOD and Cloud Threats Loom, But IT is Woefully Unprepared

A new generation of unknown security threats stemming from megatrends and technologies like BYOD, mobility, cloud computing, and internet usage, as well as internal actions both accidental and malicious, introduce organizations to a multitude of new risks. However, according to a new report, the majority of IT leaders around the world say they don’t view these threats as top security concerns.
21 February 2014

Enterprise Vulnerability Management Not Keeping Pace with Cloud and Mobility Enterprise Vulnerability Management Not Keeping Pace with Cloud and Mobility

Despite an increased focus on zero-day exploits, traditional vulnerability management solutions are unnecessarily exposing most to security threats that could be mitigated through continuous monitoring (CM), according to a report from Forrester Consulting.
19 February 2014

Showing 11 - 20 of 649 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×