Cloud Security

Learn about cloud threats, the latest cloud security technologies, and the leading approaches for protecting data in cloud services.

Cloud Security

Finals Week: Cloud Edition

It’s almost summertime—where the nights are longer and the water is warmer! Before we head to the beach it’s time to review all the things we learned about the cloud from the past two quarters. For #CloudFinalsWeek we’re asking you to prove your knowledge on the current climate of cloud ...

Cloud Security

The Cloud: Crossroads or Fast Lane for Enterprise Databases?

As someone who has enjoyed spending time with many a DBA (database administrator) over the years, and for better or worse has spun up a fair few DBMS (Database Management System) himself, I’m excited and also just a little scared of the potential that the hybrid cloud holds. It is ...

Cloud Security

The Ramifications of the Skills Shortage on Cloud Security

Week over week, a new threat against valuable data emerges. Sometimes, adversaries in cybersecurity find ways to infiltrate systems through advanced malware strains. Other times, they’ll find holes in an organization’s infrastructure, which have been accidentally created by a well-intentioned employee. Both occur all too often, but the latter is ...

Cloud Security

Enriching Cloud Threat Intelligence and Visibility – Cloud Workload Security and AWS GuardDuty

This blog was written by Stan Golubchik. Using cloud-native threat intelligence to enhance workload security Risk assessment is crucial in today’s public cloud. In Amazon Web Services (AWS), native monitoring services for ingress and egress network data can shed light on potential network threats and anomalies. A service of AWS, ...

Cloud Security

Cloud is Ubiquitous and Untrusted

As we release the resulting research and report at the 2018 RSA Conference, the message we learned this year was clear: there is no longer a need to ask whether companies are in the cloud, it’s an established fact with near ubiquitous (97%) acknowledgement.

Cloud Security

Cloud Protection Moves Into a New Phase

This blog post was written by Sandy Orlando. It’s RSA Conference season and a great time to talk about containers and security. No, not traditional shipping containers. Containers have become developers’ preferred deployment model for modern cloud applications, helping organizations accelerate innovation and differentiate themselves in the marketplace. This is ...

Cloud Security

GDPR Planning and the Cloud

Data protection is on a lot of people’s minds this week. The Facebook testimony in Congress has focused attention on data privacy. Against this backdrop, IT security professionals are focused on two on-going developments: the roll-out next month of new European regulations on data (the General Data Protection Regulation, or ...

Cloud Security

NSP Finds Common Ground in a Time of Change

As enterprise customers move from the private to the public cloud, they are looking for safety and uninterrupted coverage, but also multi-platform availability and inter-operativity with other products The public cloud offers convenience, cost savings, and the opportunity to shift capital infrastructure spending to an operational expense model. But it ...

Enterprise Cloud Security

A Brief History of Cloud Computing and Security

According to recent research1, 50% of organizations use more than one public cloud infrastructure vendor, choosing between Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform and a series of others. 85% of those using more than one cloud infrastructure provider are managing up to four1, seeking the best fit ...

Enterprise Cloud Security

Cloud Risk in a Rush to Adopt – New Research from the SANS Institute

This post was written by Eric Boerger. Twenty-one percent of organizations don’t know if their organization has been breached in the cloud. That uncertainty, lack of control, and limited visibility is a startling indication of the state of cloud use today: The speed of adoption has invited risk that was not foreseen. ...

Subscribe to McAfee Securing Tomorrow Blogs