In the final installment of this series, we focus on S$A attacks as well as some ways your organization can prevent side-channel attacks on its VMs.
Discussion of two side-channel attacks meant to retrieve sensitive information from a virtual machine (VM) on the same physical processor package.
Recent research has revealed that just 1 percent of enterprise employees pose up to 75 percent of cloud security risk due to a lack of user education.
This discussion is meant to facilitate the understanding of side-channel attacks, which affect today's modern multicore processors.
File sync services are now at risk of man-in-the-cloud (MitC) attacks, putting critical information at risk. What's the threat level for corporate data?
A research report showed tokenization is gaining traction with banks that have begun to store highly sensitive information in the cloud.
Cloud security solutions may be the answer for health care organizations seeking to secure data, but they don't come without risks.
Some 30,000 instances of MongoDB are accessible over the Internet because of a failure by database administrators to properly configure them.
Certain CISO strategies will ensure an enterprise is poised to meet the challenges associated with new tech advancements, from mobile to cloud.
Detailed description of three side-channel attacks mounted against the platform-as-a-service (PaaS) cloud model as well as preventative measures for each.