cloud security alliance - News, Features, and Slideshows
Web hosting centers around the world are being compromised by cyber-criminals that use them to launch major attacks against business and government, says Cisco in its annual security report. This threat really gained full steam last year, the company says.
By Ellen Messmer | 16 January, 2014 05:20
Cloud-based services are still often seen as too risky for sensitive information. Take the case at Kingsport, Tenn.-based Eastman Chemical Company, which said "no" to the cloud when designing its new crisis communications system.
By Ellen Messmer | 02 January, 2014 19:12
Microsoft has plugged a vulnerability in Microsoft Office 365 that would have let attackers grab user identities and steal email and documents, according to Adallom, the security vendor that says it discovered the problem.
By Ellen Messmer | 10 December, 2013 23:18
The Cloud Security Alliance (CSA) is putting forward an innovative encryption-based security architecture for software-defined networks and cloud environments that draws some of its inspiration from high-security networks used by the U.S. Department of Defense and intelligence agencies.
By Ellen Messmer | 06 December, 2013 15:28
The problem with IT security professionals is they spend too much time stopping business people from trying new things, including cloud services, out of worries about risk when they should really be working directly with business managers to help them innovate by means of security.
By Ellen Messmer | 05 December, 2013 22:18
The leaking of classified documents detailing the data collection activities of the U.S. National Security Agency earlier this year reignited some long-standing concerns about the vulnerability of enterprise data stored in the cloud.
By Jaikumar Vijayan | 01 January, 2014 00:58
Edward Snowden's revelations about the U.S. government's data collection program could cause U.S. providers of cloud-based services to lose 10% to 20% of the foreign market to overseas rivals.
By Patrick Thibodeau | 26 August, 2013 10:10
If you’re looking for your first ERP system or looking to upgrade from an existing system, the evaluation, selection and implementation process is a long-term strategic decision for your organization. To help you through this process, here are eight simple steps for a successful ERP system selection.
Mining company Teck Resources wanted to ensure high availability and responsiveness for its critical employee communications systems. To achieve this goal, Teck chose a comprehensive F5 traffic management and secure access solution that provides high availability and give users a more responsive experience.
- The Pirate Bay makes searching for torrents easier on mobile devices
- Changes afoot as DARPA challenge robots prep for upgrade
- Apple faces privacy suit following Chinese TV report
- Government pushes website blocks to fight piracy
- New guide aims to remove the drama of reporting software flaws
- 'Canvas fingerprinting' tracking is sneaky but easy to halt
- Baidu reports strong mobile ad sales, echoing Facebook
- ASX-listed Bitcoin miner hails results
- UNSW researchers see future for Oculus Rift in engineering
- IoT inspires new components for energy, wireless
- Bitcoin: Addressing concerns over a 51% attack
- In Pictures: 14 must-have iPhone, iPad travel apps
- Newegg takes pre-orders for Samsung's first 3D Pro SSD
- New SSL server rules go into effect Nov. 1
- Wolfram fortifies SystemModeler with more libraries