Cloud security must be a team effort between providers and customers. The distribution of responsibility depends on the cloud model.
According to the IBM X-Force Threat Intelligence Index for 2017, commercial malware made a notable comeback in 2016 and remains a top threat in 2017.
According to a new report, organizations struggled to maintain IT resilience in 2016 due to challenges related to migration, downtime, the cloud and more
With more businesses turning to SaaS and cloud-based systems, CIOs often lack a proper understanding of the organization's application portfolio.
Despite its many cost and efficiency benefits, adopting SaaS can introduce new security issues if not managed and tested according to best practices.
When migrating security to the cloud, IT managers must measure the complete total cost of ownership, which includes tangible and intangible costs.
The third wave of the internet requires an approach to identity management that recognizes the need to share PII selectively to maximize its value.
The cloud access security broker (CASB) market is young but rapidly maturing — and it's giving businesses a new perspective on cloud adoption.
As clients embrace cloud environments, firewalls come down and new types of users start accessing cloud data, introducing additional security challenges.
When the lines of business within an enterprise create a culture of shadow IT, it can have far-reaching consequences for the organization as a whole.