5 Key Cloud Security Use Cases

| | cloud computing
A use case typically describes a situation where and how a system, product or service can be used. This is usually a short list of steps an actor should take in order to reach a goal. The concept of... Go on to the site to read the full article ... Read More

Deep Packet Inspection in the Cloud

| | cloud computing
When looking at network traffic in a very simplified way, network packets are made up of headers and data (or code). While the headers are mostly used to direct the traffic to the right destination... Go on to the site to read the full article ... Read More

Honeypots in the Cloud

| | cloud computing
Why Use Honeypots? For an organization that has a reasonably complete security posture, including a mature threat intelligence capability, the implementation of a so-called “honeypot” should be... Go on to the site to read the full article ... Read More

Developments Around Cloud TAP Capability

| | cloud computing
Whether it’s for troubleshooting or for security monitoring purposes, being able to capture network packets from inside a network at strategic points is invaluable. Think, for instance, of users... Go on to the site to read the full article ... Read More

The Cloud Browser

| | cloud computing
Discussions around personal privacy are becoming louder and more complicated, while many countries are trying to get a grip on social networks and on the challenges presented by encrypted Web... Go on to the site to read the full article ... Read More

Cloud Based IDS and IPS Solutions [Updated 2018]

| | cloud computing
Defense-In-Depth is a term used to describe the practice of creating a multi-layered defense system within a network. Each layer should be covered by one or more different security controls. This... Go on to the site to read the full article ... Read More

The Value of Online Malware Collections

| | Malware Analysis
The Problem with Malware One of the biggest security threats to a modern business is a malware outbreak. The risk of its occurrence is fairly high, thanks to the prevalence of malware-spam... Go on to the site to read the full article ... Read More

Using Cloud Infrastructure to Gain Privacy and Anonymity

| | cloud computing
Why would a security professional need anonymity? Anonymity and the need for privacy are often associated with suspicious or even criminal activity. For instance, in the Cyber Security sector, one of... Go on to the site to read the full article ... Read More

Secure Your Buckets

| | cloud computing
Cloud Storage When it comes to public cloud storage, traditional storage concepts such as hard disks and RAID arrays have been replaced by new, much more flexible options. Data stored within a cloud... Go on to the site to read the full article ... Read More

Controlling the Risks of Cloud-Enabled End-Point Security Products

| | cloud computing
Cloud Connectivity for End-point Security Products A relatively new feature in Antivirus products has led to an evolution of most traditional Antivirus products: Cloud connectivity. Many vendors such... Go on to the site to read the full article ... Read More