Security News

Fugue launched the Fugue Compliance Suite to make it easier for enterprises to validate cloud infrastructure against security and compliance policy to prevent data breaches. Included in the Fugue...

Protecting "East-West" cloud traffic - the traffic between apps and virtual machines - is a significant challenge, but microsegmentation can help address it, says Raghu Raghuram of VMware.

Most enterprises have embraced the advantages a cloud infrastructure can bring to their computing, storage, network or other needs, and many are juggling multiple cloud platforms, some private and...

McAfee released new products expanding its McAfee MVISION portfolio, a solution that allows customers to deploy security on their terms as they move to the cloud. Joining McAfee MVISION ePO,...

Research from Threat Stack found that 54% of companies are worried about outgrowing their current security solutions.

As more and more organizations embrace the migration to the cloud, there are the inevitable questions that arise around its safety. Specifically, enterprises need to know that their data is going...

Security incidents involving cloud infrastructure have become a regular occurrence since many organizations began shifting their assets to the cloud. Many of these incidents happen because of...

A10 Networks launched the A10 Thunder 7445 Threat Protection System (Thunder TPS), the performance 1 rack unit (RU) and density of throughput per RU appliance. Now cloud, Internet and gaming...


CyberArk launched CyberArk Privileged Session Manager for Cloud. Through a transparent user experience, this new offering extends privileged access session isolation, monitoring and control to the...