Cloud Security Briefing New and Advice

How a cloud-based Kali Linux system helps with pen testing

Cloud Security Briefing: News and Advice - Wed, 11/15/2017 - 9:00am
Enterprises can use a Kali Linux system in the cloud for penetration testing. Expert Frank Siemons explains how it works and some alternative methods for testing.

Words to go: Azure cloud security services

Cloud Security Briefing: News and Advice - Tue, 11/14/2017 - 9:54am
Cloud security is a high priority for enterprises, but the range of services can be overwhelming. For Azure users, here's a quick cheat sheet of must-know security tools.

How can a hypervisor deployment avoid security risks?

Cloud Security Briefing: News and Advice - Mon, 11/13/2017 - 9:00am
A hypervisor deployment can put the security of an organization at risk, but there are ways to make it secure. Expert Judith Myerson outlines how to make the process safer.

Why web application attacks are a growing threat to the cloud

Cloud Security Briefing: News and Advice - Wed, 11/08/2017 - 9:00am
New research found that web application attacks present a significant threat to cloud environments. Rob Shapland explains the risks and what enterprises should do about them.

Cloud security tools reflect disparate vendor perspectives

Cloud Security Briefing: News and Advice - Mon, 11/06/2017 - 1:58pm
The latest cloud security tools exemplify the major providers' varied approaches to address user concerns, and protect customers from themselves.

Understanding VM escape vulnerabilities and how to avoid them

Cloud Security Briefing: News and Advice - Wed, 11/01/2017 - 9:00am
In the last couple of years, VM escape vulnerabilities have popped up and caused problems for enterprises that rely on the cloud. Expert Ed Moyle explains how to handle these issues.

Healthcare cloud security benefits from advanced protection

Cloud Security Briefing: News and Advice - Tue, 10/31/2017 - 9:00am
Although healthcare organizations have wavered on trusting their data to cloud service providers, there are areas where the cloud excels in security.

How Docker APIs can be misused to plant malware

Cloud Security Briefing: News and Advice - Wed, 10/25/2017 - 9:00am
Researchers discovered how Docker APIs can be exploited to hide malware. Dave Shackleford explains the attack method and the threat it poses to container and virtual machines.