Most popular

Cloud in pictures

News about Cloud
  • Forget BYOD – it's now BYOC

    By Anthony Caruana | 01 April, 2014 11:11

    For the last couple of years CIOs and CSOs have been fighting to manage the rising tide of personal devices entering the enterprise. But that's changing as people start to bring their own cloud apps and services into the enterprise. BYOC – Bring your own Cloud – is the new challenge.

  • Why aren’t we winning the security battle?

    By Anthony Caruana | 31 March, 2014 22:12

    Given the billions of dollars that have been invested in security over the last decade or so, you'd expect that malware distributors and data thieves to be scurrying away with their tails between their legs. But that's simply not the case.

  • New methods for addressing insider threats: A roundtable discussion

    By John Dix | 17 March, 2014 20:10

    Technology advances have made it easier to detect subtle, anomalous end-user behavior, such as installation of unusual apps on endpoint devices, or suspicious deviations from baseline activity. This roundtable discussion examines methods to build monitoring, control and context into enterprise insider threat protection efforts – both when dealing with privileged users and regular employees.

  • Infosec 2020 – Coming Sooner Than You Think

    By Anthony Caruana | 04 March, 2014 14:29

    Trend Micro has been pushing their Vision 2020 theme for some time now. The online video series "2020" is the story about the near future based on an ICSPA report entitled Project 2020. Rik Ferguson is Trend Micro's Vice President for Product Research. We spoke to him at RSA Conference 2014 about whether the vision of 2020 is coming true.

  • Cloud encryption still lagging far behind other use cases: SafeNet

    By David Braue | 27 February, 2014 21:59

    Increasing use of mobile and cloud-based services to store mission-critical data is raising the profile of enterprise data-encryption services, but a survey of Australian executives suggests that immature encryption-key management continues to compromise the technology's potential benefits.

Features about Cloud
  • 12 hot US security start-ups to watch

    By Ellen Messmer | 13 November, 2013 13:23

    Going into 2014, a whirlwind of security start-ups are looking to have an impact on the enterprise world. Most of these new ventures are focused on securing data in the cloud and on mobile devices. Santa Clara, California-based Illumio, for example, founded earlier this year, is only hinting about what it will be doing in cloud security. But already it's the darling of Silicon Valley investors, pulling in over $42 million from backer Andreesen Horowitz, General Catalyst, Formation 8 and others.

  • Tech Titans Talk: The IDG Enterprise Interview Series

    By CIO | 17 May, 2013 14:15

    In the IDG Enterprise Interview Series, you'll hear from technology CIOs and CEOs on today's burgeoning trends, ongoing headaches and upcoming product plans. Check out this informative series from IDG Enterprise Chief Content Officer John Gallant and his team of editors.

  • Who has responsibility for Cloud security?

    By John Dix | 25 March, 2013 20:09

    As more organisations leverage the Cloud for critical business applications, they are discovering one of the greatest challenges is combining existing internal controls with cloud protection efforts.

  • Hybrid Clouds pose new security challenges

    By Christine Burns Rudalevige | 11 February, 2013 06:19

    If 2013 is the year enterprises begin implementing their hybrid Cloud strategies, as the experts are predicting, then it follows that this will also be the year when hybrid Cloud security takes center stage.

  • Cloud security tips and tricks

    By Christine Burns | 11 February, 2013 06:19

    Users and security consultants familiar with the process of securing hybrid clouds have one steady piece of advice to offer: the only way to go is one step at a time.

Whitepapers about Cloud

CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Secure Virtualization of Business Applications

Run your mission-critical applications in a secure and compliant virtual datacenter, or private cloud.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.