Browse Business Software Categories

Close  

Read the latest Cloud Security software articles, news and reviews.

Misconceptions of Automated Web Traffic

Misconceptions of Automated Web Traffic

By Sandeep Singh | Jan 30 2019

Automated web traffic is one of the most destructive forces threatening web application security. What it does is perform unbelievable amounts of hidden requests and submissions against multiple characteristics of a website. This goes for ... Read More

What are Malicious Automated Attacks?

What are Malicious Automated Attacks?

By Sandeep Singh | Sep 12 2018

The nature of website attacks on the internet has changed dramatically over recent years. Today, when competitors and hackers think to bring down a business, the best and most efficient way is to launch an ... Read More

The Rise of Automated Threats to Web Applications

The Rise of Automated Threats to Web Applications

By Sandeep Singh | Mar 21 2018

The nature of website attacks on the internet has changed dramatically over the recent years. These days, when competitors and hackers think to bring down a business, the best and most effective way is to ... Read More

Cloud Security Tips for Tax Season

Cloud Security Tips for Tax Season

By Avery P. | Feb 21 2018

Every year, people seem to say, “The past year was the worst in history for data leaks.” In 2017, that was the case again. From the terrifying Equifax data leak to the hack of literally ... Read More

Preparing For The Cloud: 6 Tips For Effective Cloud Security

Preparing For The Cloud: 6 Tips For Effective Cloud Security

By Rehan J. | Jun 16 2015

Cloud security remains a sticking point for many companies. However, advanced precautions are meaningless if companies don't effectively prepare their cloud infrastructure for cloud challenges. Here are six tips for effective cloud security to help ... Read More

How Do I Protect Myself in the Internet of Things?

How Do I Protect Myself in the Internet of Things?

By Robert Siciliano | Jan 27 2014

"The Internet of Things" is a formal term referring to distinctly identifiable objects (cars, kitchen appliances, smartphones) and their cyber-representations on the Internet. By 2020, it's projected by at least one expert that there will ... Read More

First Look: Adallom's Behavior-Tracking Cloud Security

First Look: Adallom's Behavior-Tracking Cloud Security

By Mark Aspillera | Jan 09 2014

There's no such thing as perfect data security, be it on premise or in the cloud. There will always be a risk of being compromised by both external and internal attacks. What makes Menlo Park-based ... Read More

Merchants, Do You Know Where Your Card Data Is?

Merchants, Do You Know Where Your Card Data Is?

By Robert Siciliano | Dec 31 2013

Card fraud affects merchants, not just shoppers. Guest blogger Robert Siciliano explains the importance of knowing where your customers' card data is. Read More

How Cloud Payroll Is Safer Than Flying

How Cloud Payroll Is Safer Than Flying

By Gareth Cartman | Dec 10 2013

For every benefit associated with the cloud there's also a perceived risk--mostly about security and losing control of one's data. In this piece Gareth Cartman dispels some of the phobias associated with something as sensitive ... Read More

5 Ways to Protect Your Mobile Devices From Prying Eyes

5 Ways to Protect Your Mobile Devices From Prying Eyes

By Robert Siciliano | Dec 10 2013

Do you know how to keep your phone from the prying eyes of exes, strangers, cops, other officials and even your own spouse? Here are tips to keep your mobile safe and secure. Read More