What the CISO Should Know About Protecting Encryption Keys In Cloud Environments

For decades, encryption key management provided by hardware security modules (HSM) has been the foundation for data security, but as companies move to the cloud they often find the HSM on-premises data encryption model does not efficiently serve the needs of protecting encryption keys in cloud environments. As enterprises contend with security threats CISOs are looking for simpler, standardized methods of securing data.

How Virtual Machine Tech Keeps Pace With Security Threats

When thinking about virtualization’s impact on security, it is important to consider both the downside (“What new threats does it expose me to?”) and the upside (“How can I use it to my advantage?”). The answer depends on your implementation. And don’t forget interconnection.

How to Cure Security Alert Fatigue, and Still Protect your Cloud Infrastructure

Security analytics (on-premises or cloud) should be interconnected to the data they are analyzing at a more fundamental level, so that staff members no longer need to examine each alert or informational message, evaluate all details behind the events leading up to the alert, and then determine what to do.

Be Ready: DDoS Attacks Like You’ve Never Seen Are Coming

In September, a series of attacks included an assault on the French web hosting company OVH that reached a once inconceivable 1.1 terabits per second. And the very next month, an attack on the web infrastructure provider Dyn topped that, reportedly hitting 1.2 terabits per second.

De-Perimeterization – Staying Secure in the Face of Growing Attack Surfaces

The best way to deal with morphing attack surfaces is to implement what the military calls “defense-in-depth,” where multiple security layers protect digital assets.