Organizations face a March 1 deadline for ensuring their cloud and other service providers comply with Massachusetts? data protection regulation. View full post on SearchCloudSecurity: RSS Feed View full post on National Cyber Security
PCI virtualization compliance: Three steps for PCI compliance in the cloud
PCI compliance in the cloud is tough but implementing these strategies can help. View full post on SearchCloudSecurity: RSS Feed View full post on National Cyber Security
SaaS, Cloud, encryption & you
This article is part of the Business IT Series in association with Intel Opinion SaaS, Cloud, encryption you Published: 14:41, 31 January 12 Any IT professional who has heard “send it to my Hotmail” or “popped it into Dropbox for you” echo across the office will know how impossible it…
Security pros need to get in front of cloud computing trend, RSA panel says
Security teams need to innovate and adapt to cloud, according to CISO panel View full post on SearchCloudSecurity: RSS Feed View full post on National Cyber Security
Cloud Security Technologist / Dome9 Security / San Mateo, CA
Dome9 Security/San Mateo, CA Dome9 is looking for an extraordinary technology evangelist to drive awareness and adoption of its newly launched service. A pioneer in security management, Dome9 centralizes and automates cloud security across all servers and clouds. This is a unique opportunity to play a key role in one…
HP Software CTO: brokers will spur cloud adoption
Cloud computing growth will be driven by the proliferation of cloud brokerages, offering packages of cloud services from a selection of different providers and adding value through managed access or enhanced security. This is the view of Ken O’Hagan, chief technology officer of HP Software for the UK and Ireland….
MIT and DARPA investigate possibility of self-healing secure cloud
MIT researchers and the US government are investigating the feasibility of creating cloud computing infrastructure which can recognise a cyberattack, eliminate it, and never stop working while all that is being done. Researchers at MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL) have received funding from the Defense Advanced Research…
Cloud Security Alliance focuses on mobile threats and solutions at RSA
Whether already computing in cloud environments, planning to do so soon, or just thinking about it – how those systems will be kept secure is once again a topic that is front and center here at the third annual Cloud Security Alliance (CSA) summit, held at the RSA Conference. At…
Trend Micro brings intrusion detection back from cloud with Deep Discovery
Trend Micro today announced Deep Discovery, a threat detection tool designed to monitor network traffic in order to detect signs of stealthy attacks aimed at stealing corporate data. Deep Discovery is intended to focus on the question, “Is there human attacker activity in the network?” says Kevin Faulkner, senior enterprise…
Cloud Application Tester / Yoh / Santa Clara, CA
Yoh/Santa Clara, CA Yoh has a contract opportunity for a Cloud Application Tester to support our client in Santa Clara, CA. Job Responsibilities: – Drive end-to-end QA test plan execution, as assigned by management, with a high level of effectiveness and efficiency. – Apply industry best practice QA processes and…