Back to homepage

How many employees present a cloud security risk?

Based on analysis across 10 million users, 1 billion files, and over 91,000 applications, CloudLock focused on the riskiest element in the cloud: user behavior. 1 percent of users represent

Vendor News

CloudPassage Granted Three Patents for Agile Security

SAN FRANCISCO, Aug. 25, 2015 /PRNewswire/ — CloudPassage today announced that it has been awarded three patents, to compliment its 2011 foundational patent (U.S. No.8,412,945 B2) describing an agent-based, agile security


Confident and Careful: The Security Benefits of the Cloud

You need a security strategy that delivers the best value with the least risk. But most traditional security systems fail to balance those two needs. Thankfully, there are emerging cloud

Identity Theft

The Illusion of Online Privacy – U.S. News & World Report

So far this year, 505 data breaches have targeted businesses, government agencies and other institutions, exposing more than 139 million records, according to the Identity Theft Resource Center. The sheer number of

BYOD/Big Data

Bring Your Own Device: From Security to Success

With 95% of organizations now permitting employee-owned devices in the workplace, the days of IT issuing corporate-owned devices are becoming very rare. The benefits of implementing a Bring Your Own

Identity Theft

U.S. Court Affirms FTC Authority to Enforce Data Breach Rules

NEWS ANALYSIS: The Philadelphia-based U.S. Third Circuit Court of Appeals finds that the FTC can sue Wyndham Hotels for lax security practices that led to a data breach. In a

Vendor News

HDE Announces Partnership with Master Concept

HDE, Inc., a leading cloud-based security provider based in Japan, and Master Concept International Limited, an award-winning cloud integrator, today announced partnership to provide cloud security solutions to Hong Kong


How to get better at web application security

Robert Hansen, Vice President of WhiteHat Security Labs, has more than 20 years of web application and browser security experience. In this interview he discusses the evolution of web application


Samsung smart fridge leaves Gmail logins open to attack

Security researchers have discovered a potential way to steal users’ Gmail credentials from a Samsung smart fridge. Pen Test Partners discovered the MiTM (man-in-the-middle) vulnerability that facilitated the exploit during


Risky mobile behaviors are prevalent in the government

Mobile devices are extremely prevalent in federal agencies, even within those that purport to have policies prohibiting the use of them. Lookout analyzed 20 federal agencies and found 14,622 Lookout-enabled