August 2, 2016 Cloud File Storage Can Be a Shadow Threat 2 min read - The latest edition of the Shadow Data Report found that most cloud file storage apps fail to achieve compliance with SOC 2 and GDPR.
Cloud Security August 2, 2016 Cloud Adoption and Challenges in Asia-Pacific 2 min read - Global cloud adoption has increased over the years and continues to grow at a rapid pace, especially in the Asia-Pacific region.
Cloud Security July 28, 2016 2016 Gartner Magic Quadrant for IDaaS Names IBM a Visionary for Cloud Identity Service 2 min read - The 2016 Gartner Magic Quadrant for IDaaS named IBM as a Visionary for Cloud Identity Service, cementing its position as a leader in the space.
July 26, 2016 Industrial Espionage Actors Now Serving Up Server Attacks 2 min read - Industrial espionage is on the way up in the age of cloud computing. How can organizations embrace this technology and protect themselves?
Cloud Security July 25, 2016 Just Discovering Shadow IT Isn’t Enough to Improve a Company’s Cloud Security Posture 2 min read - Businesses large and small have adopted cloud applications, and most companies have a growing concern about their cloud security.
July 19, 2016 Inside the Bunker at Wimbledon 2016 2 min read - IBM's security experts are dedicated to protecting the Wimbledon brand and its reputation as one of the premier tennis tournaments in the world.
Cloud Security July 18, 2016 ‘Pokemon Go’ and Five Security Requirements for Using Cloud Apps 2 min read - The viral new mobile app "Pokemon Go" serves as a valuable reminder of some cloud application security best practices for enterprises.
Cloud Security July 11, 2016 IDaaS: Life Before and After Cloud IAM 2 min read - A security expert spoke to Security Intelligence regarding how cloud IAM quickly solves common identity and access management problems.
Cloud Security June 30, 2016 Integrated Security Solutions for Hybrid Cloud Deployments 2 min read - Special security solutions are needed to protect hybrid cloud environments through managed access, data protection and network visibility.
Cloud Security June 27, 2016 What Is IDaaS? A CISO Clears Up Confusion Around the Definition of Cloud IAM 4 min read - In an interview, one chief information security officer provides a clear definition of IDaaS, or cloud-based identity and access management.