DHS Awards Galois, Waverley Labs DDoS Defense Program Contracts | ExecutiveBiz | September 21, 2015 |
What Do You Do When Employees Start Using a Free Cloud Service? | Havard Business Review | September 18, 2015 |
How safe and secure is open-source OpenStack? | Computerworld | September 16, 2015 |
Why the security industry needs a standardized framework for CASBs | Tech Target | September 16, 2015 |
Are You Sitting on a Cloud-Based House of Cards? | No Jitter | September 11, 2015 |
Microsoft Ignites a new Focus on Security (Part 3) | WindowSecurity.com | September 08, 2015 |
How will security attitudes change in the era of the smart city? | Information Age | September 08, 2015 |
Cloud Security Alliance touts data breach sharing scheme | Wha Tech | September 08, 2015 |
Enterprises and third party operators across Nordic markets gather to debate how cloud data centers are becoming the indispensable infrastructure | Vmblog | September 06, 2015 |
Data security: In cloud computing environments, partners bulk up | Cloud Search Provider | September 04, 2015 |
RSA's Ex-CEO Coviello Back In The Game | Dark Reading | September 03, 2015 |
Who Can Afford the Right to Be Forgotten by Google? | Voice of America | September 01, 2015 |
5 Ways to Make Public Cloud More Secure | eSecurity Planet | September 01, 2015 |
Software Defined Perimeters | Federal News Radio | August 31, 2015 |
How to Tackle Your Customers' Misguided Security Fears | MSP Mentor | August 31, 2015 |
Taiwan market: CHT partners with Microsoft to provide cloud computing service | Digitimes | August 27, 2015 |
Big Data Security: Why It's a Problem and What We Can Do About It | Smart Data Collective | August 26, 2015 |
Financial firms use 1,004 cloud apps, increasing burden on IT | Cloud Pro | August 25, 2015 |
Finance sector looking further to the cloud, but beware security risks | Cloud Tech | August 25, 2015 |
Ensuring Security When You No Longer Own the Network | IoT Evolution World (blog) | August 24, 2015 |