Email Alerts
-
Security, cloud monitoring tools viewed as cloud adoption barriers
Video: Eric Chiu, president of HyTrust, explains why subpar cloud monitoring tools are a top barrier to cloud adoption in the enterprise. Video
-
Cloud security panel discusses transparency, Notorious Nine at RSA
A panel of cloud security experts fielded questions on cloud provider transparency, the CSA's Notorious Nine report and more at RSA Conference 2013. News
-
Eric Chiu analyzes version 2 of the PCI DSS cloud computing guidelines
Video: Eric Chiu, president of HyTrust, examines v. 2 of the PCI DSS cloud computing guidelines and offers guidance on cloud customer responsibility. Video
-
John Howie discusses CSA initiatives, cloud adoption issues at RSA
Video: John Howie, COO of the Cloud Security Alliance, discusses the ongoing initiatives at the CSA and how to overcome cloud adoption issues. Video
-
Software patching 2.0: Cutting costs with virtual patching, automation
Struggling to bring the cost of the patch management process down? Expert Michael Cobb suggests virtual patching and automated tools can play a role. Tip
-
Monitoring cloud services requires business support, existing tools
Existing security tools and business relationships are often the best methods for monitoring cloud services to spot rogue clouds in the enterprise. Tip
-
Dell SecureWorks adds vulnerability management services for cloud
Dell SecureWorks is bringing security vulnerability management services to its cloud customers, along with its Global Threat Intelligence Service. News
-
Evaluating cloud providers: Avoid security issues with cloud computing
Are security issues with cloud computing blocking an implementation? Expert Davi Ottenheimer offers tips for evaluating cloud providers for security. Video
-
Security Warrior for Cloud Transparency
Ron Knode, who passed away earlier this year, was a tireless advocate for cloud security transparency. Feature
-
Seven Outstanding Security Pros in 2012
Find out who won this year’s Security 7 Award, which honors outstanding security professionals in seven vertical markets. Also in this issue, we examine the pros and cons of the Metasploit penetration testing framework, and ways to overcome cloud com... E-Zine
Security Management Strategies for the CIO