ChaptersCircleEventsBlog
Join us for the in-person CCSK Azure course at Black Hat from August 4–5! Register now for a hands-on deep dive and secure your spot now!

Announcements

Announcements
How AT&T Is Virtualizing Security
How AT&T Is Virtualizing Security

The CIO Report

May 18, 2015

Oracle Issues VENOM Security Updates
Oracle Issues VENOM Security Updates

SecurityWeek

May 18, 2015

Sony Hack Aftermath: How Hollywood is Getting Tough on Cybersecurity
Sony Hack Aftermath: How Hollywood is Getting Tough on Cybersecurity

Variety

May 14, 2015

Channel Partner Program Roundup: Cirrity, Westell, Carousel Industries
Channel Partner Program Roundup: Cirrity, Westell, Carousel Industries

The VARGuy

May 14, 2015

THE ROLE OF CLOUD BROKERS IN THE CLOUD
THE ROLE OF CLOUD BROKERS IN THE CLOUD

Backup Technology

May 13, 2015

Cloud Security Alliance, Waverley Labs Collaborate On Open-Source Software-Defined Perimeter Spec
Cloud Security Alliance, Waverley Labs Collaborate On Open-Source Software-Defined Perimeter Spec

Dark Reading

May 13, 2015

What will a Majority Conservative Government mean for the Cyber Security and Tech Industry?
What will a Majority Conservative Government mean for the Cyber Security and Tech Industry?

Information Security Buzz

May 12, 2015

Cloud Access Security Broker keeps usage data on-premise as you discover, analyze and secure cloud applications
Cloud Access Security Broker keeps usage data on-premise as you discover, analyze and secure cloud applications

Network World

May 11, 2015

The new perimeter and the rise of IDaaS
The new perimeter and the rise of IDaaS

GCN

May 8, 2015

Combating the Notorious Nine with Zero Trust Data Security
Combating the Notorious Nine with Zero Trust Data Security

Cloud Wedge

May 8, 2015

NIST prepping more cloud security control guidance to complement FedRAMP
NIST prepping more cloud security control guidance to complement FedRAMP

FierceGovernmentIT

May 7, 2015

Top 11 Virtualization Risks Identified
Top 11 Virtualization Risks Identified

Network Computing

May 7, 2015

Cirrity Snags Cisco Master Service Provider Designation as Company Announces Azure Solutions
Cirrity Snags Cisco Master Service Provider Designation as Company Announces Azure Solutions

TMCnet

May 6, 2015

TIC overlay just the beginning for FedRAMP, says Goodrich
TIC overlay just the beginning for FedRAMP, says Goodrich

FierceGovernmentIT

May 6, 2015

IT misconfiguration errors open senstive data to theft from IaaS cloud environment
IT misconfiguration errors open senstive data to theft from IaaS cloud environment

FierceITSecurity

May 5, 2015

Make the cloud fit like a nice suit
Make the cloud fit like a nice suit

Federal Computer Week

May 5, 2015

Cloud Security Alliance, (ISC)²® Team Up on New Cloud Security Certification
Cloud Security Alliance, (ISC)²® Team Up on New Cloud Security Certification

The VAR Guy

May 5, 2015

New Cloud Security Certification
New Cloud Security Certification

Cloud Tweaks

May 4, 2015

Inside IaaS Security Challenges for Enterprises
Inside IaaS Security Challenges for Enterprises

SecurityWeek

May 4, 2015

Cloud Security Alliance Federal Summit 5 May in DC
Cloud Security Alliance Federal Summit 5 May in DC

CTOvision.com

May 1, 2015