Email Alerts
-
Microsoft vows to improve cloud service after Azure outage
Software giant said it will apply lessons learned after Leap Day outage of its cloud service. News | 23 Mar 2012
-
DHS cloud computing: Homeland Security’s model private cloud strategy
Using private cloud at separate data centers has allowed the Department of Homeland Security to strike a balance between security and cost savings. News | 05 Oct 2011
-
CSA cloud provider registry aims to boost cloud transparency
Free online registry will provide documentation of cloud provider security controls. News | 04 Aug 2011
-
Amazon launches new cloud identity management functionality
AWS customers can now use their existing identity management systems. News | 04 Aug 2011
-
Symantec executives caution customers on cloud provider security
Businesses must hold cloud providers to the same security standards they hold themselves to, Symantec executives said at the company’s annual Vision user conference. News | 04 May 2011
-
Cloud computing compliance: Visibility key
Transparency is essential for security and compliance when working with cloud services providers, RSA panelists say. News | 17 Feb 2011
-
Zscaler launches cloud-based mobile device security service
Zscaler launched its mobile device security service to provide continuity of each user's security policy across a variety of devices including iPhones, iPads and Android devices. Article | 15 Feb 2011
-
Fidelis and CloudShield partner to prevent data breaches
Fidelis Security Systems and CloudShield Technologies Inc. have entered into an agreement to offer Fidelis' data breach prevention solutions on CloudShields bladecenter. Article | 15 Feb 2011
-
Juniper Networks moving forward with gateway for VM security
Juniper Networks has begun unifying products from its acquisition of Altor Networks, combining vGW Virtual gateway with SRS Series Services Gateway for virtual machine security. Article | 15 Feb 2011
-
IBM announces new cloud security services
IBM is selling professional services, hosted security event and log management technology and a hosted vulnerability management service. News | 21 Oct 2010
Security Management Strategies for the CIO