Cloud Security

Learn about cloud threats, the latest cloud security technologies, and the leading approaches for protecting data in cloud services.

Cloud Security

Banking on the Cloud: How to Enable File Sharing in Financial Services

According to Gartner, CISOs face a “double-edged sword” as they are tasked with combating the growth of shadow IT while enabling secure access to approved cloud services. Cloud file sharing and collaboration services can be an area of risk as industries must remain vigilant about protecting their IP, ensuring regulatory ...

Cloud Security

The Legal Precedent Requiring Encryption in the Cloud

In one survey after another about the adoption of cloud computing, CIOs and other technology leaders readily admit that their top concern is data security. There is a growing number of government and industry regulations and standards designed to help protect the confidentiality of data that companies have in their care. The ...

Cloud Security

New Research Reveals Vulnerability of SSL/TLS Ciphersuite RC4 to Exploit

SSL/TLS is a key part of the security infrastructure for the Internet. It’s embedded in every web browser and encountered by most web users as the mysterious browser lock symbol. SSL/TLS is formed from a suite of protocols, including (most importantly) the Handshake Protocol and the Record Protocol. The former uses ...

Cloud Security

Anthem Data Breach: A Wake-up Call for Security and Governance

The Anthem security breach and massive PII data exposure is an unfortunate recent reminder that breaches are now routine. Hackers can leverage the most basic vulnerabilities, such as static passwords to gain access to protected systems. It also highlights a troubling new trend whereby hackers use cloud services, particularly unapproved ...

Cloud Security

5 Devious Instances of Insider Threat in the Cloud

Security professionals would be remiss to neglect the human element of data security, a veritable chink in the security armor of every organization. Cloud services have magnified the potential consequences of user error or malice by facilitating the movement of data into and out of the enterprise, while also driving ...

Cloud Security

A New Model for Cloud Maturity

According to a recent Cloud Security Alliance survey on cloud adoption practices and trends, large companies have more mature governance practices than their smaller peers. But across the board, fewer than half of companies surveyed have implemented controls like acceptable use policies for cloud, security awareness training programs, and cloud governance ...

Cloud Security

The Cloud is Full of Unknown Unknowns

It is 12 years since Donald Rumsfeld said “there are known knowns; there are things we know we know … there are known unknowns; … we know there are some things we do not know. But there are also unknown unknowns — the ones we don’t know we don’t know”. ...

Cloud Security

CSA Survey: Security of Cloud Data Now a Board-Level Concern

Security and Skills Gap Hold Back Cloud Projects While Shadow IT Grows A recent Cloud Security Alliance & McAfee (formerly Skyhigh Networks) survey shows that while security and skills gaps remain significant barriers to corporate-sanctioned cloud projects, end users are pushing IT departments to provide more cloud applications, faster than ...

Cloud Security

7 Common Cloud Security Questions Asked by the CEO and Board of Directors

According to a recent Cloud Security Alliance survey, security of data in the cloud is now an executive-level and board-level concern for 61% of companies. That means CIOs and CISOs need to be prepared to educate non-technical executives about what their organization is doing to protect sensitive data in the ...

Cloud Security

The Top 10 Most Popular Personal Finance Apps

Smartphones and the Internet are revolutionizing personal finance. Like credit cards, ATM machines, and online banking before them, clever new apps are making it much easier to buy things online and in stores, transfer money to friends and family, pay bills on time, and manage investments. There are many recommendations ...

Subscribe to McAfee Securing Tomorrow Blogs