About five years ago Genomic Health began to introduce cloud-based business applications. Ken Stineman, senior director of enterprise architecture and security, quickly became aware of the security risks these apps posed. CSO contributor ...
Tags: Genomic Health, cloud business applications, security, apps
Cloud-security provider Zscaler has announced it has received $38 million in venture-capital funding, naming Lightspeed Ventures as a strategic investor but not the other venture-capital partners involved in the round. Until now, San ...
Tags: Cloud security funding, Mocana, Zscaler, venture capital funding
An official document containing policies and pledges for customers of Oracle’s cloud services reveals that many aspects fall in line with industry standards, while others may prompt cause for worry among customers, according to ...
Tags: Official Document, Oracle's Cloud
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe. Despite the downturn, 40% of organisations plan to increase their security budgets in 2013 in ...
Tags: IT security, security budget, security spending, IT industry
Hundreds of thousands of US public sector workers have access to cloud-based collaboration software from UK IT firm Huddle after two major US government departments sign up. A version of Huddle used by the UK government, which sits on a ...
Tags: Huddle, US Federal Government, IT
Meaningful cloud computing standards are crucial to improve the maturity of cloud-based services and bring increased flexibility, security and interoperability, but too many competing standards could wreak damage, warned the Cloud Industry ...
Tags: meaningful cloud, computing standards, cloud industry, APM Group
Global Leader in Enterprise Mobility Management Maps Out Security Considerations for Cloud Services PHILADELPHIA,PA,July 30,2012/24-7PressRelease/--Fiberlink,the global leader in software-as-a-service(Saas)solutions for both secure mobile ...
Tags: Cloud Services, Security Webinar, Fiberlink
Panda Security,The Cloud Security Company,today announced the launch of Panda GateDefender Performa eSeries,its new,unified perimeter security device that protects against all types of threats.Panda Security's new appliance enables mid-size ...
Cloud-based intelligence databases Customised risk tolerance Signature approach combined with local behavioral analysis Protecting systems offline File-scanning misses the big picture Read more about cloud and security Security continues ...
Tags: Cloud-based, intelligence databases, Security, anti-virus
Microsoft's new operating system, Windows 8, has been welcomed by a security expert, who cites a raft of tweaks and new features as beneficial for the protection of computers running the software. The most significant change, according to ...
The government's second G-Cloud framework has gone live,with twice the number of original suppliers. Of the 458 suppliers on the 12-month framework,which allows public sector bodies to buy on demand IT services,three-quarters are small ...
Tags: government, second G-Cloud framework, UK, double number of suppliers
Security system designers need to start taking into account the differences in users, according to Hugh Thompson, RSA Conference programme committee chair. "They need to build technologies that respect those differences because people ...
Tags: security system, differences in users, RSA, security tools
Cloud computing is an opportunity information security professionals should not miss,according to Philippe Courtot,chairman and CEO of security company Qualys. "This is a fantastic and opportunity to sit down with the CIO and the ...
Tags: Cloud computing, Information security, Qualys, London
Microsoft has announced a free tool for organisations to assess their security readiness for cloud computing. A survey commissioned by the company revealed that the top barriers to cloud adoption are concerns about the ability to deal ...
Veracode's Chris Eng tackles cloud security propositions,per device versus across the board BYOD solutions,and the rise of cyber attacks on SMBs. Further reading Managing mobile devices–The BYOD challenge Sheffield CIO is right to ...
Tags: cyber attacks, security challenges, BYOD