Email Alerts
-
Cloud Security Alliance releases updated guidance
New version provides more actionable advice for ensuring cloud computing security Article
-
Should cities demand data breach penalties?
SearchSecurity.com editors discuss a city's cloud contract data breach clause. Also, the value of vendor security threat reports and the Web security gateway market. News
-
Network security expert urges hardening of cloud protocols
Security needs to pay more attention to the protocols which bind the applications and infrastructure together. That's where the cracks are appearing, expert says. News
-
Security challenges with cloud computing services
Panel discusses cloud computing security issues including encryption and user authentication. Article
-
Is Identity Management as a Service (IDaaS) a good idea?
Identity Management as a Service (IDaaS) is new on the managed security service provider scene, so how can you know which of these SaaS service providers to trust with your identity and management access tools? Find out in this expert response. Ask the Expert
-
Burton Group warns of cloud computing risks
There are many benefits to the various cloud computing models. But for each benefit, such as cost savings, speed to market and scalability, there are just as many risks and gaps in the cloud computing model. News
-
Researchers say search, seizure protection may not apply to SaaS data
Researchers examining cloud computing security issues presented a number of technical and legal hurdles that Software as a Service users could face. Article
-
McAfee to acquire email SaaS vendor MX Logic
McAfee will acquire MX Logic, one of the few remaining independent email security SaaS vendors, for $140 million in cash in a deal announced Thursday. Article
-
How secure is 'Platform as a Service (PaaS)?'
There's no doubt that companies will want to leverage cloud computing and platform as a service, but expert Michael Cobb explains why enterprises should proceed with caution. Ask the Expert
-
When to use the service features of the Metasploit hacking tool
In this expert response, Michael Cobb explains why offloading resource-intensive penetration testing tasks to Metasploit may be an attractive option. Ask the Expert
Security Management Strategies for the CIO