Cloud Security July 11, 2016 IDaaS: Life Before and After Cloud IAM 2 min read - A security expert spoke to Security Intelligence regarding how cloud IAM quickly solves common identity and access management problems.
Cloud Security June 30, 2016 Integrated Security Solutions for Hybrid Cloud Deployments 2 min read - Special security solutions are needed to protect hybrid cloud environments through managed access, data protection and network visibility.
Cloud Security June 27, 2016 What Is IDaaS? A CISO Clears Up Confusion Around the Definition of Cloud IAM 4 min read - In an interview, one chief information security officer provides a clear definition of IDaaS, or cloud-based identity and access management.
June 15, 2016 IBM Security Is Keeping Wimbledon Safe and Secure 2 min read - IBM Security has teamed up with Wimbledon to protect this revered tennis tournament from cyberthreats and other online security incidents.
Cloud Security May 23, 2016 How to Fix the Cybersecurity Blind Spot That Is Shadow IT 2 min read - Taking advantage of security technology that can help protect against the blind spot challenges of shadow IT makes perfect sense.
Cloud Security May 13, 2016 Hey! You! Get Onto My Cloud at Cloud Security World 2016 3 min read - With 18 talks on the program, it's hard to highlight just a few, but here are some top picks for the upcoming Cloud Security World 2016 event.
Cloud Security May 5, 2016 Why I Quit Marketing IT Security Products (and Came Back Again) 3 min read - CASB has been around for a few years and presents a great opportunity for sellers to improve marketing IT security products and solutions.
Cloud Security May 3, 2016 Cloud Risks Pose the Latest Security Education Challenge 2 min read - Employees must be educated to avoid cloud risks and ensure this new era of cloud technology is a secure one for their organizations.
Cloud Security April 21, 2016 Four Simple Ways to Make Your Use of Cloud Applications 100 Times More Secure 3 min read - The widespread use of cloud applications can be beneficial for organizations, but it also opens them up to sophisticated cyberattacks.
April 18, 2016 Cloud Complications: Short URLs Come With Big Problems 2 min read - Short URLs were created to help users have an easier and smoother experience, but cybercriminals can benefit from the concept, as well.