Cloud Security

Cloud Security | News, how-tos, features, reviews, and videos

supply chain blockchain coffee beans hand with coffee cup of coffee by nathan dumlao via unsplash
business travel / airport terminal walkway / traveller

mobile security / unlocked data connections

Microsoft Intune can now block unauthorized BYOD hardware

Microsoft's decision to integrate third-party mobile threat defense software is a sign of bigger things to come for the company's UEM platform.

Computerworld > Mobile voting via Voatz phone app

Utah County to pilot blockchain-based mobile voting

A large Utah county is testing mobile absentee voting for military members and dependents living overseas, but some experts say online voting endangers the very democracy the U.S. military is supposed to protect.

blockchain bitcoin circuitry global

Blockchain will be the killer app for supply chain management in 2018

The distributed ledger technology that underpins cryptocurrencies is now poised to disrupt supply chain management – especially in the global shipping industry.

Israel Barak
video

Honeypots and the evolution of botnets | Salted Hash Ep 23

Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm's recent honeypot research, which gathered information showing how the bot landscape is evolving.

cloud network blockchain bitcoin storage

Blockchain and cryptocurrency may soon underpin cloud storage

Emerging now: P2P networks that use blockchain to manage cloud storage based on the sharing of excess drive and network capacity on PCs and in data centers. Those who share capacity get free storage – and can be paid in cryptocurrency....

Special Report: Platforms Play Big in the Cloud

This latest report in our C-Suite 360 series takes a full-spectrum look at the opportunities and risks in cloud computing, offering up the expert information your organization needs to set its cloud strategy.

Load More