Utilization of cloud services such as Software-as-a-Service (SaaS) and Infrastructure-as-a-Service (IaaS) has increased in recent years, but will lingering security concerns impede the rate of cloud services adoption?
CA Technologies recently recommissioned the Ponemon Institute, an independent research firm, to...
Most cloud security discussions have focused on what cloud providers can do, what they can't do and what they might do if you pay them enough. These discussions focus on topics such as virtualization, hosting and data storage. However, just as the software industry has learned that putting fancy boxes on the
network...
Because data stored in a cloud-based "sandbox" environment for testing purposes is vulnerable, it should be masked to protect sensitive information, says Karen Hsu of Informatica.
The growth in cloud computing and mobility is creating a need for a streamlined, centralized process for managing user authentication, says Sarah Fender of PhoneFactor.
Next-generation threats require a next-generation firewall. Steve Pao of Barracuda Networks discusses his company's new firewall solution and the new levels of protections it offers.
Given the expanse of mobility and the cloud, traditional identity and access management solutions no longer suffice. It's time for a complete business-driven IAM solution, says Jason Garbis of Aveksa.
Most organizations are challenged by having too much information in too many places. But Dieter Schuller of Radiant Logic says centralizing data can improve identity management.
Barracuda Networks announces the release of a firewall designed to meet the needs of small and mid-sized organizations. Read more about this and other news releases issued at RSA Conference 2013.
Russ Dietz of Websense likes to ask organizations: Do you really know who has access to your data? The answers often lead to uncovering security vulnerabilities that have been overlooked.
Advanced threats require an advanced security strategy. Oliver Friedrichs of Sourcefire recommends a threat-centric security approach. In this interview, he explains exactly what that entails.
Paige Leidig, chief marketing officer of CipherCloud, says information protection requirements continue to be the primary hurdle for enterprise adoption, despite explosive growth in the cloud content and collaboration market and its evident advantages to productivity and cost efficiencies.
Outsourcing to the cloud poses new risks, especially for card data. The PCI Council addresses those risks in its just-released cloud security guidance, and Bob Russo offers exclusive insights.
As enterprises move more applications to the cloud, continuous monitoring will play a greater role in assuring the software is patched in a timely manner, says John Streufert, DHS director of federal network resilience.
In the last few months, major U.S. banking institutions have been victims of a powerful wave of distributed-denial-of-service attacks that combine three different attack tools. These "Triple Crown" attacks take DDoS to a whole new level. How can institutions improve their defenses?
Join this session for expert...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.