Many organizations have adopted cloud computing, BYOD practices and expanded the use of social media, all of which require new technologies and security policies. Without changes, the security of a company is probably inadequate. Companies are concerned about managing and privacy of data entrusted to service providers. It is unclear whether this is due to…

Companies continue to struggle in identifying precise applications and services used by its employees, without prior validation from IT. The conclusion emerges from the study “Cloud adoption: practices and priorities”, conducted by the Cloud Security Alliance (CSA) on over 200 CIO and responsible for security in the world. Based on the survey of more than…

During the past year, the demand for SIEM (Security Information and Event Management) technology remained strong. The widespread adoption of the SIEM technology is driven both by the need for security and compliance with regulations. Most of security needs is the effective detection of targeted attacks and violations. Organizations are failing at early breach detection,…

McAfee in a recent report said enterprises expect to see an increase in attacks aimed at shared resources in any IaaS, PaaS, or SaaS (Infrastructure, Platform, or Software as a Service) cloud environment. Cybercriminal will target cloud-based applications and data repositories such as the ubiquitous hypervisors found in all data centers, the multitenant communications infrastructure…