Secure SaaS: Cloud services and systems News
August 27, 2015
An up-to-date application security program -- as well as knowing how to connect with stakeholders -- is critical to being a successful CISO today, said Renee Guttmann, vice president, Office of the CISO at Accuvant Inc.
April 30, 2015
At an RSA Conference session, attendees learned how WestJet Airlines' Security Architecture Made Simple with software-defined security and automation reduced network turbulence.
October 07, 2014
Sophos looks to strengthen its cloud security offerings for mobile security with the acquisition of Mojave Networks, a mobile security startup.
September 02, 2014
Following the iCloud hack and resulting leak of celebrity photos, experts say many enterprises 'don't have a clue' that corporate data could also be at risk.
Secure SaaS: Cloud services and systems Get Started
Bring yourself up to speed with our introductory content
A proper evaluation of a cloud access security broker is critical to finding the best match for your enterprise's needs. Expert Dan Sullivan outlines key criteria to keep in mind during CASB assessment. Continue Reading
Securing approved cloud applications is hard enough, but what about the apps it can't see? Expert Ed Moyle discusses three strategies for finding enterprise shadow cloud usage. Continue Reading
So, what is cloud computing anyway? The definition isn't always clear. Ravila Helen White helps enterprise security professionals figure it out. Continue Reading
Evaluate Secure SaaS: Cloud services and systems Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
AWS WorkMail is set to compete with Microsoft Outlook, but how does it compare security-wise? Expert Dan Sullivan explains. Continue Reading
Software-defined security is becoming an IT buzzword, but does it live up to the hype? Expert Kevin Beaver takes a look at the benefits and pitfalls of the technology in the enterprise. Continue Reading
Cloud-based data loss prevention can be a worrisome option for some. Kevin Beaver explains how to measure the risk vs. reward of cloud-based DLP. Continue Reading
Manage Secure SaaS: Cloud services and systems
Learn to apply best practices and optimize your operations.
In this excerpt of CSA Guide to Cloud Computing, authors Rai Samani, Brian Honan and Jim Reavis review cloud security threats based on research by the CSA's Top Threats Working Group. Continue Reading
A report from Adallom highlights the lack of SaaS security in enterprises, but expert Dave Shackleford has ways to take back the cloud and lessen the risks, such as enhanced cloud app security. Continue Reading
While cloud-based identity and access management services offer numerous benefits to enterprises, there are also a number of drawbacks. Learn the risks and rewards of cloud IAM. Continue Reading
Problem Solve Secure SaaS: Cloud services and systems Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Adopting cloud-based applications can be a security headache. Michael Cobb explains how to perform tests that validate cloud app security. Continue Reading
Should enterprises deploy cloud-based UTM when it's billed by the hour? Brad Casey discusses the pros and cons of the offering. Continue Reading
Cloud-based application security is becoming an increasingly prevalent concern. Uncover three key best practices for preventing security breaches. Continue Reading