Profile

Cover photo
108 followers|6,166 views
AboutPostsPhotosVideos

Stream

SearchCloudSecurity.com

Shared publicly  - 
 
Security researchers at Zscaler discovered a new Spy Banker Trojan campaign that's leveraging Google's public cloud services as a hosting platform
1
Add a comment...

SearchCloudSecurity.com

Shared publicly  - 
 
FireEye Inc. has announced its threat intelligence analysts recently discovered a sophisticated spear phishing campaign that used Dropbox as its base of operations.
1
Add a comment...

SearchCloudSecurity.com

Shared publicly  - 
 
If the DoD were a business, it would have over 2 million employees and an annual budget that exceeds $500 billion. So yeah, you should probably pay attention.
1
Add a comment...

SearchCloudSecurity.com

Shared publicly  - 
 
Seven years, that's all...
1
Add a comment...

SearchCloudSecurity.com

Shared publicly  - 
 
"Relinquishing control does not equate to relinquishing accountability."
1
Add a comment...

SearchCloudSecurity.com

Shared publicly  - 
 
Open source log monitoring tools like the ELK stack are a budget-friendly way for organizations to increase network visibility and improve incident response times.
Open source log monitoring is a great way for enterprises to protect their networks from attacks. Here's how to use the log monitoring tool ELK stack.
1
Add a comment...
Have them in circles
108 people
SearchEnterpriseWAN.com's profile photo
SearchExchange.com's profile photo
mht sun's profile photo
SearchCRM.com's profile photo
SearchFinancialApplications.com's profile photo
WhatIs.com's profile photo
SearchCloudApplications.com's profile photo
PrinterComparison's profile photo
SearchSQLServer.com's profile photo

SearchCloudSecurity.com

Shared publicly  - 
 
There are several major cloud security certifications currently available - how do you choose?
1
Add a comment...

SearchCloudSecurity.com

Shared publicly  - 
 
Do you think s2n will help improve TLS security?
1
Add a comment...

SearchCloudSecurity.com

Shared publicly  - 
 
A centrally controlled log management system is a must for every modern enterprise.
Unsecured system logs pose a great security risk to organizations, but an easy way to mitigate the risk is to centrally manage them with the ELK stack tool.
1
Add a comment...

SearchCloudSecurity.com

Shared publicly  - 
 
If Box is good enough for the U.S. Department of Justice, is it good enough for your company?
1
Add a comment...

SearchCloudSecurity.com

Shared publicly  - 
 
The negative effects of U.S. government surveillance have put cloud providers in a tough spot.
1
Add a comment...

SearchCloudSecurity.com

Shared publicly  - 
 
Virtualization expert Paul Henry provides a step-by-step guide to imaging a virtual machine disk (*flat.vmdk) in a forensically sound manner.
Learn how to perform a sound forensic acquisition of a virtual machine disk (*flat.vmdk) in this step-by-step guide.
1
Add a comment...
Story
Tagline
The latest updates and analysis on cloud security risks
Introduction
SearchCloudSecurity.com, part of the TechTarget network offers cloud security news and insight on risk management, data governance and compliance, virtualization security, cloud deployment strategies, SaaS, PaaS, IaaS and more.