vulnerability management

Hadoop, CouchDB Users Latest Attack Targets

The attacks on databases just keep coming. First, it was the MongoDB attack, then as Evident.io’s John Martinez wrote...

Need to Know How to Secure Big Data? How About 100 Ways?

While Paul Simon found that there are 50 Ways to Leave your Lover, the Cloud Security Alliance (CSA) found that there...

Ensuring Security in a Continuous Delivery Pipeline

In our previous post, we covered some of the major holdups when it comes to secure continuous delivery. But what does...

New AWS Key Management Service Offers Centralized Control

AWS has launched a new import key feature which allows users to import keys from their own key management...

AWS Releases Cloud Adoption Maturity Model Guidelines

AWS has released the Cloud Adoption Maturity Model, a set of guidelines intended to assist in the development of a...

AWS Security Best Practice #0: CloudTrail and Encryption

Moving your architecture to AWS in whole or part also means that your team reaps the rewards of new changes and services...

Cloud Security Alliance US Congress 2016

The Cloud Security Alliance (CSA) recently released the event schedule for the next U.S. conference scheduled to...

Shift to the Cloud Will Impact $1 Trillion in IT Spending

According to recently released research from Gartner titled “Market Insight: Cloud Shift — The Transition of IT...

Continuous Delivery: What’s the Hold Up?

Software development is evolving from ambitious projects that are built over the course of months and years, and...

Evident.io: The 451 Research Impact Report

A company’s entire cloud-based infrastructure can be created, modified, deleted or reconfigured in real time via the...

Orchestrating Security in the Cloud

The SANS Institute recently surveyed 485 IT pros investing in private and/or public cloud infrastructure about their...

Gigaom Research Whitepaper: Continuous Security and Reliability

This report will help IT executives and development teams understand the new approaches to security required in a...