Articles about Cloud Security

When one size doesn't fit all in cloud security

Sponsored You want to move from an on-premises Office suite to Office 365 in the cloud. It'll save you money in the short term and free you from providing local infrastructure. That's nice. But whoa – not so fast there. Securing cloud-based productivity systems like Office 365 takes a little forethought. Security is front-of-mind for …

Study shows 'BYOK' can unlock public cloud market for businesses

Businesses would be more likely to use store data in a public cloud environment if they were allowed to "manage and control their own encryption keys", a new study has found. According to the 2017 Thales Data Threat Report, the "bring your own encryption key" (BYOK) concept has been identified as the most popular way to secure …
OUT-LAW.COM, 30 Jan 2017

How to create a security startup and bag VC millions – step one: Containers, AI or cloud

While venture capitalists have been tightening their belts over the past year, there’s still a lot of love and funding for security startups – especially if you’re working in the right areas. During a panel discussion at the Structure Security conference in San Francisco today, a trio of top VCs identified three key areas …
Iain Thomson, 28 Sep 2016

DDoS attacks: For the hell of it or targeted – how do you see them off?

Distributed Denial of Service (DDoS) attacks can be painful and debilitating. How can you defend against them? Originally, out-of-band or scrubbing-centre DDoS protection was the only show in town, but another approach, inline mitigation, provides a viable and automatic alternative. DDoS attacks can be massive, in some cases …
Danny Bradbury, 22 Sep 2016

Papa don't breach: Wannabe singer jailed for hacking Madonna

An aspiring-singer-turned-hacker has been jailed for accessing Madonna's online accounts and stealing her unreleased music tracks. Adi Lederman, 39, had unsuccessfully appeared on Israel’s Kochav Nolad TV talent show before breaking into Team Madonna's email inbox and cloud-based systems last year to steal photographs and …
John Leyden, 10 Jul 2015

FBI: Your real SECURITY TERROR? An ANGRY INSIDE MAN

Disgruntled workers are causing more problems for their employers, the FBI warns. Employees, ex-workers or contractors with a grudge against their former paymasters are abusing cloud storage sites or remote access to enterprise networks to steal trade secrets, customer lists or other sensitive information. Insider threats …
John Leyden, 25 Sep 2014
Josh and some superheroes at Spiceworld 2013

CloudMask dons cape and sets foot on the mean streets of Blighty

Cloud-based security services firm CloudMask, whose technology offers to protect sensitive information in the cloud, even in the case of a network breach, launched in the UK on Tuesday. CloudMask's technology works on the premise that no one can be trusted with data - including cloud administrators, governments, employees, and …
John Leyden, 9 Sep 2014

A couple of whitepapers about SIEM

Promo In our first visit to the Reg whitepaper library in some time, we took time out to inspect the security pitches. Here is a couple of vendor papers about SIEM (security information and event management) software that we thought deserved a wider airing. Registration is, as per usual, required. Data control in the cloud This …
David Gordon, 5 Jun 2013

Calling all resellers:Cloud, security, SMEs and you

Mini-poll Vendors may have declared that 2012 is the year of the cloud, but it's resellers who have to deal with the fall-out from over hyped expectations and half-baked product strategies. You know what your customers really think of the cloud, and what you need to help them make the switch. So please help us enlighten the vendor …
David Gordon, 18 Jun 2012

Don't lose sleep over cloud crypto hole, says Amazon

Amazon has played down the significance of a recently discovered vulnerability affecting its flagship Amazon Web Services cloud computing platform. Interlinked security shortcomings created a theoretical mechanism for hackers to issue rogue admin requests, such as stopping virtual machines in an EC2 virtual environment or …
John Leyden, 1 Nov 2011
The Register breaking news

Crypto boffins uncover rogue task risk on Amazon cloud

Security researchers have unearthed a flaw in Amazon Web Services that created a possible mechanism for hackers to take over control of cloud-based systems and run administrative tasks. The flaw, which affected Amazon's EC2 cloud and has already been plugged, could have been abused to start and stop virtual machines or create …
John Leyden, 27 Oct 2011
The Register breaking news

Are your secrets safe with SaaS providers?

There are plenty of opportunities for people to disclose, steal or sell sensitive company data. After all, anyone who really wants to swipe information needs only the intent and a USB stick. Admittedly, truly nefarious types are in fairly short supply. But the every day threat to any company’s data comes from the unintentional …
Lucy Sherriff, 20 Jul 2011
The Register breaking news

Microsoft skills up IT pros for jobs in the cloud

You can tell that cloud computing is huge by the number of certifications and training programmes and user groups setting out their stalls. We have spotted two this week, a vendor training initiative, and a strong-arm grouping for IT security practitioners. Say hello to the Microsoft Virtual Academy, a free training facility …
Team Register, 24 Mar 2011
The Register breaking news

RSA pushes single sign-on into the clouds

RSA has launched a set of services designed to foster trust between business and cloud service providers. Cloud Trust Authority from the security division of EMC is designed to tap into the growing market for cloud computing with a roster of technologies and services, the first of which is an Identity Service. Partially based …
John Leyden, 16 Feb 2011
The Register breaking news

Yorkshire start-up aims to shake up telecoms security

UK-based security appliance firm Syphan aims to shake up telecoms security from an unlikely base in Skipton, North Yorkshire. Syphan is developing a range of 10G (Gigabit) deep packet inspection security appliances, capable of allowing telecoms firms and managed security providers to offer functions such as intrusion …
John Leyden, 3 Sep 2009
The Register breaking news

F-Secure grabs online storage firm in cloud security push

Net security firm F-Secure has bought privately-held online storage and data management firm Steek in a deal designed to improve its sales to telcos. The agreement, announced Friday, is valued at € 27.5m ($38.4m), with the possibility of a further performance-based payment of up to €2.5m next year. Steek's technology is …
John Leyden, 13 Jul 2009

Create a news alert about Cloud Security, or find more stories about Cloud Security.

Biting the hand that feeds IT © 1998–2017