Email Alerts
-
Black Hat 2010 podcast: Jim Reavis on first Cloud Security Alliance user certification
Jim Reavis, cofounder of the Cloud Security Alliance, discusses the group's first user certification, the Certificate of Cloud Security Knowledge (CCSK), and how IT organizations should address security and compliance in the context of cloud computin... News | 03 Aug 2010
-
Website aims to track cloud services problems
Jake Kouns of the Open Security Foundation talks about his latest project, Cloutage.org, which aims to track many of the outages, flaws and other issues that plague cloud services. News | 14 Jul 2010
-
Customers pleased with Google Enterprise desktop security
Google Enterprise desktop customers praise the platform and tout its security and privacy features. News | 21 Jun 2010
-
Former @stake researcher Aitel insists on data classification
Know your data before turning to the cloud, says Dave Aitel, CTO of Immunity Inc. Aitel criticized traditional security technologies at FIRST Conference 2010. Article | 16 Jun 2010
-
Study on security in cloud computing shows angst, rogue users
Many IT pros don't know the number of cloud-based services used in the enterprise and few are taking chances moving sensitive data to the cloud, a Ponemon Institute survey finds. Article | 12 May 2010
-
Federal CISOs worry they can't effectively secure cloud computing
An (ISC)2 survey finds federal CISOs pleased with the government's efforts to improve network security, but lack support for hiring skilled security pros. Article | 06 May 2010
-
Cloud computing risks outweigh benefits, survey finds
The risks of cloud computing outweigh the benefits according to a survey of more than 1,800 U.S.-based IT professionals who are members of the ISACA organization. Article | 08 Apr 2010
-
Cloud computing risks, challenges
K. Scott Morrison, CTO at Layer 7 Technologies talks about the issues hindering adoption of cloud computing. Also, Wade Baker of Verizon on a security incident framework. News | 08 Apr 2010
-
Social networking risks, benefits for enterprises weighed by RSA panel
Social networking risks to enterprises may be outweighed by the benefits, but experts at the 2010 RSA Conference say infrastructure providers must improve security. Article | 10 Mar 2010
-
Microsoft's Charney details new botnet protection, IdM technology at RSA
At the 2010 RSA Conference, Scott Charney, Microsoft's top Trustworthy Computing executive, discussed the software giant's new approach to botnet protection, detailed its new identity management technologies and explained why cloud computing risks up... Article | 02 Mar 2010
Security Management Strategies for the CIO