With cloud-based resources becoming an integral part of the enterprise, it's time for security leaders to recognize the best ways to protect these assets.
Researchers at Graz University of Technology in Austria developed a novel SGX malware attack that can extract an RSA key in under five minutes.
Companies all over the world are beginning to recognize the potential of hybrid cloud to deliver opportunities for innovation and revenue growth.
When moving data and services to the cloud, IT leaders must implement cloud security measures at every step of the complex migration process.
It's critical to protect sensitive cloud-based data using encryption while it is being stored, and to delete it securely at the end of its life cycle.
A recent study revealed that security professionals face a new kind of shadow IT due to the widespread migration of custom apps to the cloud.
The phishing attack is still fraudsters' favorite trick. Researchers recently observed new phishing campaigns aimed at cloud storage services.
To respond to ever-increasing cyberthreats, IT professionals have developed new security methods that drive sustained IT innovation.
The zero trust model requires IT managers to abandon the "trust but verify" concept and manage user access according to a strategy of least privilege.
To move sensitive data securely to the cloud, establish a data-centric philosophy and approach to security and apply it across all platforms.