How AT&T Is Virtualizing Security | The CIO Report | May 18, 2015 |
Oracle Issues VENOM Security Updates | SecurityWeek | May 18, 2015 |
Channel Partner Program Roundup: Cirrity, Westell, Carousel Industries | The VARGuy | May 14, 2015 |
Sony Hack Aftermath: How Hollywood is Getting Tough on Cybersecurity | Variety | May 14, 2015 |
THE ROLE OF CLOUD BROKERS IN THE CLOUD | Backup Technology | May 13, 2015 |
Cloud Security Alliance, Waverley Labs Collaborate On Open-Source Software-Defined Perimeter Spec | Dark Reading | May 13, 2015 |
What will a Majority Conservative Government mean for the Cyber Security and Tech Industry? | Information Security Buzz | May 12, 2015 |
Cloud Access Security Broker keeps usage data on-premise as you discover, analyze and secure cloud applications | Network World | May 11, 2015 |
Combating the Notorious Nine with Zero Trust Data Security | Cloud Wedge | May 08, 2015 |
The new perimeter and the rise of IDaaS | GCN | May 08, 2015 |
Top 11 Virtualization Risks Identified | Network Computing | May 07, 2015 |
NIST prepping more cloud security control guidance to complement FedRAMP | FierceGovernmentIT | May 07, 2015 |
Cirrity Snags Cisco Master Service Provider Designation as Company Announces Azure Solutions | TMCnet | May 06, 2015 |
TIC overlay just the beginning for FedRAMP, says Goodrich | FierceGovernmentIT | May 06, 2015 |
Cloud Security Alliance, (ISC)²® Team Up on New Cloud Security Certification | The VAR Guy | May 05, 2015 |
IT misconfiguration errors open senstive data to theft from IaaS cloud environment | FierceITSecurity | May 05, 2015 |
Make the cloud fit like a nice suit | Federal Computer Week | May 05, 2015 |
New Cloud Security Certification | Cloud Tweaks | May 04, 2015 |
Inside IaaS Security Challenges for Enterprises | SecurityWeek | May 04, 2015 |
Cloud Security Alliance Federal Summit 5 May in DC | CTOvision.com | May 01, 2015 |