August 5, 2015 Why Banks Are Turning to Tokenization to Protect Cloud Data 2 min read - A research report showed tokenization is gaining traction with banks that have begun to store highly sensitive information in the cloud.
Cloud Security July 29, 2015 Health Care Data Breaches and the Cloud: Trick or Treat? 3 min read - Cloud security solutions may be the answer for health care organizations seeking to secure data, but they don't come without risks.
July 23, 2015 About 30,000 Instances of MongoDB Exposed on Web, Security Researcher Says 2 min read - Some 30,000 instances of MongoDB are accessible over the Internet because of a failure by database administrators to properly configure them.
CISO July 8, 2015 Looking Ahead: CISO Strategies for 2020 3 min read - Certain CISO strategies will ensure an enterprise is poised to meet the challenges associated with new tech advancements, from mobile to cloud.
Cloud Security June 30, 2015 Platform-as-a-Service (PaaS) Cloud Side-Channel Attacks: Part II 6 min read - Detailed description of three side-channel attacks mounted against the platform-as-a-service (PaaS) cloud model as well as preventative measures for each.
Cloud Security June 23, 2015 Platform-as-a-Service (PaaS) Cloud Side-Channel Attacks: Part I 5 min read - A discussion of three types of cloud environments and details on three side-channel attacks on the platform-as-a-service (PaaS) cloud model specifically.
Cloud Security June 12, 2015 The Insider Threat: A Cloud Platform Perspective 3 min read - Organizations can protect themselves from the dangers of an insider threat by implementing several cloud security best practices.
Intelligence & Analytics June 2, 2015 Outsourcing IT Security Infrastructure Is Like Hiring a Good Lawn Service Company 2 min read - Enterprises that take advantage of outsourcing to meet their security needs can benefit from lower costs and opportunities for future tech advancements.
Application Security May 21, 2015 Does the VENOM Vulnerability Affect You? 4 min read - The VENOM flaw is the latest security vulnerability to come to light. But are you at risk? And how should you react if your data is suceptible to attacks?
May 14, 2015 VENOM Flaw: The Truth About the Danger to Data Centers and Cloud Customers 2 min read - Researchers recently exposed the VENOM flaw, which could let hackers sabotage virtual machines in cloud computing environments around the world.