The traditional mission of security is evolving under the influence of several key trends regarding the functions, staffing, processes and core capabilities of the security operations center.
Cloud security must be a team effort between providers and customers. The distribution of responsibility depends on the cloud model.
A recent study revealed that security professionals face a new kind of shadow IT due to the widespread migration of custom apps to the cloud.
Despite its many cost and efficiency benefits, adopting SaaS can introduce new security issues if not managed and tested according to best practices.
When adopting PaaS solutions, IT leaders must consider the many security concerns that arise when data is stored and shared using cloud services.
Many organizations are choosing to adopt cloud and hybrid cloud architectures to integrate with infrastructure-as-a-service (IaaS) solutions.
Additional cloud security controls are worth every penny of your investment to ensure perimeter defense for your public cloud deployments.
As clients embrace cloud environments, firewalls come down and new types of users start accessing cloud data, introducing additional security challenges.
In the final installment of this series, we focus on S$A attacks as well as some ways your organization can prevent side-channel attacks on its VMs.
Discussion of two side-channel attacks meant to retrieve sensitive information from a virtual machine (VM) on the same physical processor package.