cloud security alliance - News, Features, and Slideshows
Web hosting centers around the world are being compromised by cyber-criminals that use them to launch major attacks against business and government, says Cisco in its annual security report. This threat really gained full steam last year, the company says.
By Ellen Messmer | 16 January, 2014 05:20
Cloud-based services are still often seen as too risky for sensitive information. Take the case at Kingsport, Tenn.-based Eastman Chemical Company, which said "no" to the cloud when designing its new crisis communications system.
By Ellen Messmer | 02 January, 2014 19:12
Microsoft has plugged a vulnerability in Microsoft Office 365 that would have let attackers grab user identities and steal email and documents, according to Adallom, the security vendor that says it discovered the problem.
By Ellen Messmer | 10 December, 2013 23:18
The Cloud Security Alliance (CSA) is putting forward an innovative encryption-based security architecture for software-defined networks and cloud environments that draws some of its inspiration from high-security networks used by the U.S. Department of Defense and intelligence agencies.
By Ellen Messmer | 06 December, 2013 15:28
The problem with IT security professionals is they spend too much time stopping business people from trying new things, including cloud services, out of worries about risk when they should really be working directly with business managers to help them innovate by means of security.
By Ellen Messmer | 05 December, 2013 22:18
The leaking of classified documents detailing the data collection activities of the U.S. National Security Agency earlier this year reignited some long-standing concerns about the vulnerability of enterprise data stored in the cloud.
By Jaikumar Vijayan | 01 January, 2014 00:58
Edward Snowden's revelations about the U.S. government's data collection program could cause U.S. providers of cloud-based services to lose 10% to 20% of the foreign market to overseas rivals.
By Patrick Thibodeau | 26 August, 2013 10:10
If you’re looking for your first ERP system or looking to upgrade from an existing system, the evaluation, selection and implementation process is a long-term strategic decision for your organization. To help you through this process, here are eight simple steps for a successful ERP system selection.
Eight breaches in 2013 provided a painful reminder that cybercrime remains prevalent. This year’s report once again covers the wide-ranging threat landscape, with data collected and analysed by security experts, while calling out seven areas that deserve special attention.
- Samsung, Apple still dominate smartphones, but their shares slip
- Ford and GM sued for millions over CD-ripping tech in cars
- Twitter more than doubles its sales, stock soars
- BlackBerry focuses on security for the enterprise
- Chinese officials seize Microsoft PCs, emails, financial info in antitrust probe
- Oracle hits back at ex-employee's claims over in-memory database option
- Homeland Security wants corporate board of directors more involved in cyber-security
- BlackBerry buying German firm for voice encryption
- NASA breakthrough improves 3D printing in space
- Secrets to CIO Longevity
- Uber, Airbnb go after businesses
- Guns, vandals and thieves: Data shows US networks under attack
- As IoT changes how carriers make money, Ericsson is buying new smarts
- Google, Linaro develop custom Android edition for Project Ara
- Senator pushes new version of bill to limit NSA phone records collection