Most popular

cloud security in pictures

News about cloud security
  • Forget BYOD – it's now BYOC

    By Anthony Caruana | 01 April, 2014 11:11

    For the last couple of years CIOs and CSOs have been fighting to manage the rising tide of personal devices entering the enterprise. But that's changing as people start to bring their own cloud apps and services into the enterprise. BYOC – Bring your own Cloud – is the new challenge.

  • How IT can establish better cloud control

    By Thor Olavsrud | 25 February, 2014 10:10

    Employees who use software-as-a-service (SaaS) applications are more irresponsible about password security, file transfer and IT compliance. But IT's failure to communicate about risky behaviour and provide tools to help employees do their work is part of the problem. Here are steps you can take to bring SaaS back under control.

  • Self-empowering cloud users more likely to compromise security: Softchoice

    By David Braue | 18 February, 2014 11:31

    Employees using software-as-a-service (SaaS) cloud applications have so many credentials to keep track of that they're far more likely than non-cloud users to compromise their passwords through insecure storage, a recent survey by service and solutions provider Softchoice has found.

  • Cloud-based user authentication hotting up as SafeNet asserts lead: Gartner

    By David Braue | 13 December, 2013 15:49

    The latest Magic Quadrant for User Authentication market assessment from Gartner has placed SafeNet well ahead of 19 other vendors in the highly competitive and increasingly important segment of the IT security market.

  • Appoint a cloud purchasing 'czar' as business-cloud mediator: Stewart-Rattray

    By David Braue | 28 November, 2013 12:36

    Businesses concerned about the security of cloud-computing systems should appoint a 'cloud purchasing czar' whose sole responsibility is to evaluate cloud service providers (CSPs) and manage their interactions between business and IT executives, a leading security consultant has advised.

Features about cloud security
  • Legal concerns curb corporate cloud adoption

    By Howard Baldwin | 03 December, 2012 11:17

    Inside the enterprise, the biggest obstacle to cloud computing is often the company's own corporate counsel. Here's how IT is getting to yes with legal.

  • Cloud Computing Poses Control Issues for IT

    By Kevin Fogarty | 18 May, 2010 04:42

    Though most U.S. companies still list customer and other corporate information as their most valuable assets, many keep pushing this data farther from safe lockdown in the data center--and are about to give it another strong shove in that direction.

Whitepapers about cloud security

CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Business Continuity Management Solutions

Automate business-continuity and disaster-recovery planning and enable crisis management in one solution.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).

  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.