Quantcast
Channel: Infosecurity - Blog
Browsing latest articles
Browse All 98 View Live

Outsourcing B2B Integration: The Forgotten Option

By Stuart Lisk Business continuity remains a major concern for enterprises as they move more mission-critical processes to the cloud. Outsourcing B2B integration while ensuring cloud security in order...

View Article


Are Network Perimeters the Berlin Walls of Cloud IAM?

By Ed KingA single enterprise wide identity and access management (IAM) platform is a noble but unattainable goal. The network perimeter is now a metaphorical “Berlin Wall” between the two identity...

View Article


Free Your Data & the Apps Will Follow – But what About Security?

 By Mark O'NeillApplication Programming Interfaces (API) represent such an important technology trend, that new business models are evolving on top of them, and this has led to the term “the API...

View Article

Think Beyond the Enterprise: It's Time to Secure the "Edge of the Cloud"

By Ed KingEveryone is familiar with the notion of securing the edge of the enterprise. With the growing adoption of cloud technologies, IT must now also think about securing the "edge of the Cloud"....

View Article

Some Things To Consider When Extending Your IdM Into the Cloud

By Mark O’NeillLike many organizations, you no doubt face the challenge of extending your IT operations into the cloud to take advantage of the many cloud-based services demanded by your users today....

View Article


Image may be NSFW.
Clik here to view.

Security Considerations When Evaluating Applications on the Google Apps...

 By Tsahy ShapsaCustomers care about the security of their data in the cloud, and security of customer data is obviously important to Google, which is why Google has invested in completing numero ...

View Article

Consumerization 101 – Employee Privacy vs. Corporate Liability

By Cesare GarlatiMary D. joined MD&M Inc. in 2009. Being an Apple enthusiast, she was quite excited to learn that the company offered an innovative BYOD program that allows employees to use their...

View Article

Application-Aware Firewalls

By Andy ThuraiYou may have heard this term recently and wondered what it meant. When it comes to security, everyone thinks of Firewalls, Proxies, IPS, IDS, Honeypots, VPN devices, email security and...

View Article


Best Practices to Secure the Cloud with Identity Management

By Dan DagnallWhat is the “cloud identity?” The “cloud identity” begins at the birth of the user’s “digital identity” and includes the attributes to define “who you are.” “Cloud Identity” is not a new...

View Article


Big Data, Big Cloud, Big Problem

By Todd ThiemannBig Data presents a big opportunity for businesses to mine large volumes of data from a variety of sources to make better and more high-velocity decisions. Since big data...

View Article

Avoiding Storms in the Cloud: The Critical Need for Independent Verification

By Chris WysopalLast year, Forrester predicted that cloud computing would top $240 billion in 2020. Market Research Media came up with a

View Article

Your Cloud Provider is a Partner…Not a One-Night Stand

By Eric Sheridan“We programmatically interface with Cloud Providers to manage our customer data, so we can rely on them for securing our services right?” Wrong!The moment you start interfacing with a...

View Article

Is Crypto in the Cloud Enough?

By Jon-Michael C. BrookBox.net, DropBox, iCloud, SkyDrive, Amazon Cloud Drive... the list goes on for convenient cloud storage options. Some have had a security incident; the rest will. All implement...

View Article


Can You Be Sued for Using the Cloud?

By Gerry GrealishWe all know that adopting the Cloud comes with some risks – security, reliability and scalability have, to-date, been the most popular complaints. But now, we can add a new one to the...

View Article

7 Steps to Developing a Cloud Security Plan

By David GrimesIn IT, the easiest way to stop a new technology or solution from being implemented is to raise a security red flag. As soon as someone mentions concerns around a new IT solution not...

View Article


Managing Consumer Technology in the Enterprise - Why IT Needs to Change its...

By Cesare GarlatiTalking regularly about the consumerization of IT can often make one sound like a broken record, but the economic, security and management challenges it throws up for enterprises are...

View Article

The Impact of Computing Power on Cryptography

By Eric HayAdvanced technology is a beautiful thing. Not only has it enabled the creation of new, more efficient methods of application delivery and data storage (the Cloud is a prime example), but...

View Article


Riding the Consumerization Wave

By Cesare GarlatiRather than resist it, organizations should embrace Consumerization to unlock its business potential. This requires a strategic approach, flexible policies and appropriate security and...

View Article

Removing Cloud Barriers in Europe

By David StottNo one is immune to the ever-changing technology forecast, but one constant (at least for the near future) appears to be global cloud cover. Cloud computing is arguably the most dominant...

View Article

Context + Analytics = Good Security

By Jon-Louis HeimerlData [dey-tuh] noun: individual facts or statisticsInformation [in-fer-mey-shuhn] noun: knowledge concerning a particular fact or circumstanceWhen does data become consumable...

View Article

The High Costs of Securing Identities: How to Fix the Problem Using the Cloud

By Dan DagnallIdentity management is well down the path of a mature market space. But I believe there is still one final, fundamental disconnect that is driving up the cost of deploying and maintaining...

View Article


Image may be NSFW.
Clik here to view.

The Battle of the Titans: What it all means for IT managers caught in the middle

By Cesare GarlatiAdapt, accept and manage: a BYOD mantra for corporate ITRIM and Apple: two firms with more contrasting current fortunes you could not wish to imagine. The once high-flying Canadian ...

View Article


When Good Is Not Good Enough: NIST Raises the Bar for Cloud Data Protection...

By David StottEarlier this year, the US National Institute of Standards and Technology (NIST) released a publication titled Cloud Computing Synopsis & Recommendations (Special Publication 800-146)...

View Article

The Shrinking Security Model: Micro-perimeters

By Ed KingAs cloud and mobile computing make enterprise IT ever more extended, the traditional security model of keeping the bad guys out and allowing only the good guys in no longer works well. While...

View Article

Why Should I Get My Certificate of Cloud Security Knowledge (CCSK)? Or Train...

“The CSA, in providing a set of goals through the CCSK, is challenging security practitioners to become the cloud thought-leaders we need today and tomorrow to ensure safe and secure cloud...

View Article


Three Critical Features that Define an Enterprise-Grade Cloud Service

By David BakerThe line between enterprise and consumer is fading as employees work from all manner of devices to access the on-premises, cloud and even consumer applications needed to get work done....

View Article

How to Harden Your APIs

By Andy ThuraiThe market for APIs has experienced explosive growth in recent years, yet the major issues that providers still face are protection and hardening of the APIs that they expose to users. In...

View Article

Going Up? Safety First, then Send your Data to the Cloud

By Joe SturonasAs the proliferation of data continues to plague businesses, the pressure is on for companies to migrate away from their physical data centers. Cloud computing is being adopted at a...

View Article

Cloud APIs - the Next Battleground for Denial-of-Service Attacks

By Mark O’NeillIn recent months, there have been a number of highly publicized cyber attacks on US banks. These attacks took the form of Distributed De ...

View Article



Cloud-Based Identity Management: Best Practices for Rapid End-User Adoption

By Glenn ChoquetteIdentity Management (IdM) is not new. Yet, after all this time on the market, organizations still have mixed results for end-user adoption, as many organizations that rolled-out IdM...

View Article

How to Adopt the Public Cloud While Attaining Private Cloud Control and Security

By Gerry GrealishEarlier this year, McKinsey & Company released an article titled “Protecting information in the cloud,” discussing the increased us ...

View Article

Identity Management Plays a Key Role in Mobile Device Management (MDM)

By Dan DagnallAs BYOD and other mobile device related initiatives take hold, sooner rather than later, identity management will once again be considered as an ...

View Article

Security Check List: An Ounce of Prevention is Better than a Pound of Cure

By Wolfgang KandekIt is common belief that buying more robust and expensive security products will offer the best protection from computer-based attacks; that ultimately the expenditure pays off by...

View Article


Plugging "Cloud Identity Leaks": Why Your Business Should Become an Identity...

By Mark O’NeillMost people have used the Facebook, Twitter, or Google Apps buttons located on websites to log into third-party services. This approach is useful within consumer IT as it enables the...

View Article

Building Trust and Security through Transparency of Service

By David BakerWith the growing movement of enterprises to the cloud, it’s more important than ever that service providers demonstrate and prove good security practices to their customers, in good times...

View Article

How the “Internet of Things” Will Feed Cloud Computing’s Next Evolution

By David CanellosWhile the Internet of Things is not a new concept (Kevin Ashton first coined the term in 1999 to describe how the internet is connected to the physical world), it is just now becoming...

View Article


Rethink Cloud Security to Get Ahead of the Risk Curve

By Kurt JohnsonEver since the cloud sprung up to the top of every IT discussion, the issue of cloud security was right alongside it. Let’s face it, enterprise security has never been easy, and the...

View Article


Don’t Let a Disaster Leave your Data Out in the Cold

By Andrew WildWhen we see images from natural disasters like Hurricane Sandy of flooded neighborhoods, downed power lines and destroyed homes the first concern, of course, is for the safety of the...

View Article

A Hybrid Approach for Migrating IAM to the Cloud

By Merritt MaximWe continue to hear about how cloud, mobility and the consumerization of IT has the potential to transform business. However, the ongoing hype around these trends may lead some to...

View Article

IT Opportunities Surrounding Shadow IT

By Kamal ShahThe magnitude of Shadow IT is significant and growing. Gartner has predicted< ...

View Article

A Prescription for Cloud Data Security for Healthcare Service Providers

By Kamal ShahCloud services are here to stay, and practically everybody is embracing them. In fact, the cloud computing industry is growing at the torrid pace of nearly 30% per year right now,...

View Article


Beyond Encryption: The 5 Pillars of Cloud Data Security

By Kamal ShahGiven the recent influx of cybersecurity attacks and the hubbub about the National Security Agency’s PRISM program, there is lot of talk about the im ...

View Article

Watering Hole Attacks: Protecting Yourself from the Latest Craze in Cyber...

By Harold ByunCybercriminals are clever and know how to evolve – you’ve got to give them that. They’ve proven this once again with their latest cyber-attack strategy, the

View Article


Digital Certificates: Gone in 60 Months or Less

By Gavin HillFor years, cybercriminals have been taking advantage of the blind trust organizations and users place in cryptographic keys and digital certificates. Only now are vendors starting to...

View Article

Patching the Perpetual MD5 Vulnerability

By Gavin HillEarlier this month, Microsoft updated the security advisory that deprecates the use of MD5 hash algorithms for certificates issued by certification authorities (CA) in the Microsoft root...

View Article


SSH – Does Your “Cloud Neighbor” Have an Open Backdoor to Your Cloud App?

By Gavin HillSecure Shell (SSH) is the de facto protocol used by millions to authenticate to workloads running in the cloud and transfer data securely. Even more SSH sessions are established...

View Article

What Should Cloud-enabled Data Security Protections Look Like in the Future?

By V.Jay LaRosaWhile listening to one of my favorite podcasts about two months ago, I heard a quote from a man named William Gibson that really resonated with me. He said, "The future is here already,...

View Article

Cloud Collaboration: Maintaining Zero Knowledge across International Boundaries

By Jonathan GohstandThe increasingly global nature of business requires companies to collaborate more and more across borders, exchanging all manner of documents: contracts, engineering documents and...

View Article

Image may be NSFW.
Clik here to view.

Seeing Through the Clouds

By TK KeaniniThe economics of cyber-attacks have changed over the years. Fifteen years ago, it was all about network penetration, but today advanced attackers are more concerned about being detected....

View Article


Why Higher Education Institutions Need Cloud-based Identity Providers

By Dan DagnallFederation is definitely a hot topic these days, with NSTIC attempting to create an identity ecosystem, InCommon continuing to build its service-provider fede ...

View Article

Browsing latest articles
Browse All 98 View Live