Outsourcing B2B Integration: The Forgotten Option
By Stuart Lisk Business continuity remains a major concern for enterprises as they move more mission-critical processes to the cloud. Outsourcing B2B integration while ensuring cloud security in order...
View ArticleAre Network Perimeters the Berlin Walls of Cloud IAM?
By Ed KingA single enterprise wide identity and access management (IAM) platform is a noble but unattainable goal. The network perimeter is now a metaphorical “Berlin Wall” between the two identity...
View ArticleFree Your Data & the Apps Will Follow – But what About Security?
By Mark O'NeillApplication Programming Interfaces (API) represent such an important technology trend, that new business models are evolving on top of them, and this has led to the term “the API...
View ArticleThink Beyond the Enterprise: It's Time to Secure the "Edge of the Cloud"
By Ed KingEveryone is familiar with the notion of securing the edge of the enterprise. With the growing adoption of cloud technologies, IT must now also think about securing the "edge of the Cloud"....
View ArticleSome Things To Consider When Extending Your IdM Into the Cloud
By Mark O’NeillLike many organizations, you no doubt face the challenge of extending your IT operations into the cloud to take advantage of the many cloud-based services demanded by your users today....
View ArticleSecurity Considerations When Evaluating Applications on the Google Apps...
By Tsahy ShapsaCustomers care about the security of their data in the cloud, and security of customer data is obviously important to Google, which is why Google has invested in completing numero ...
View ArticleConsumerization 101 – Employee Privacy vs. Corporate Liability
By Cesare GarlatiMary D. joined MD&M Inc. in 2009. Being an Apple enthusiast, she was quite excited to learn that the company offered an innovative BYOD program that allows employees to use their...
View ArticleApplication-Aware Firewalls
By Andy ThuraiYou may have heard this term recently and wondered what it meant. When it comes to security, everyone thinks of Firewalls, Proxies, IPS, IDS, Honeypots, VPN devices, email security and...
View ArticleBest Practices to Secure the Cloud with Identity Management
By Dan DagnallWhat is the “cloud identity?” The “cloud identity” begins at the birth of the user’s “digital identity” and includes the attributes to define “who you are.” “Cloud Identity” is not a new...
View ArticleBig Data, Big Cloud, Big Problem
By Todd ThiemannBig Data presents a big opportunity for businesses to mine large volumes of data from a variety of sources to make better and more high-velocity decisions. Since big data...
View ArticleAvoiding Storms in the Cloud: The Critical Need for Independent Verification
By Chris WysopalLast year, Forrester predicted that cloud computing would top $240 billion in 2020. Market Research Media came up with a
View ArticleYour Cloud Provider is a Partner…Not a One-Night Stand
By Eric Sheridan“We programmatically interface with Cloud Providers to manage our customer data, so we can rely on them for securing our services right?” Wrong!The moment you start interfacing with a...
View ArticleIs Crypto in the Cloud Enough?
By Jon-Michael C. BrookBox.net, DropBox, iCloud, SkyDrive, Amazon Cloud Drive... the list goes on for convenient cloud storage options. Some have had a security incident; the rest will. All implement...
View ArticleCan You Be Sued for Using the Cloud?
By Gerry GrealishWe all know that adopting the Cloud comes with some risks – security, reliability and scalability have, to-date, been the most popular complaints. But now, we can add a new one to the...
View Article7 Steps to Developing a Cloud Security Plan
By David GrimesIn IT, the easiest way to stop a new technology or solution from being implemented is to raise a security red flag. As soon as someone mentions concerns around a new IT solution not...
View ArticleManaging Consumer Technology in the Enterprise - Why IT Needs to Change its...
By Cesare GarlatiTalking regularly about the consumerization of IT can often make one sound like a broken record, but the economic, security and management challenges it throws up for enterprises are...
View ArticleThe Impact of Computing Power on Cryptography
By Eric HayAdvanced technology is a beautiful thing. Not only has it enabled the creation of new, more efficient methods of application delivery and data storage (the Cloud is a prime example), but...
View ArticleRiding the Consumerization Wave
By Cesare GarlatiRather than resist it, organizations should embrace Consumerization to unlock its business potential. This requires a strategic approach, flexible policies and appropriate security and...
View ArticleRemoving Cloud Barriers in Europe
By David StottNo one is immune to the ever-changing technology forecast, but one constant (at least for the near future) appears to be global cloud cover. Cloud computing is arguably the most dominant...
View ArticleContext + Analytics = Good Security
By Jon-Louis HeimerlData [dey-tuh] noun: individual facts or statisticsInformation [in-fer-mey-shuhn] noun: knowledge concerning a particular fact or circumstanceWhen does data become consumable...
View ArticleThe High Costs of Securing Identities: How to Fix the Problem Using the Cloud
By Dan DagnallIdentity management is well down the path of a mature market space. But I believe there is still one final, fundamental disconnect that is driving up the cost of deploying and maintaining...
View ArticleThe Battle of the Titans: What it all means for IT managers caught in the middle
By Cesare GarlatiAdapt, accept and manage: a BYOD mantra for corporate ITRIM and Apple: two firms with more contrasting current fortunes you could not wish to imagine. The once high-flying Canadian ...
View ArticleWhen Good Is Not Good Enough: NIST Raises the Bar for Cloud Data Protection...
By David StottEarlier this year, the US National Institute of Standards and Technology (NIST) released a publication titled Cloud Computing Synopsis & Recommendations (Special Publication 800-146)...
View ArticleThe Shrinking Security Model: Micro-perimeters
By Ed KingAs cloud and mobile computing make enterprise IT ever more extended, the traditional security model of keeping the bad guys out and allowing only the good guys in no longer works well. While...
View ArticleWhy Should I Get My Certificate of Cloud Security Knowledge (CCSK)? Or Train...
“The CSA, in providing a set of goals through the CCSK, is challenging security practitioners to become the cloud thought-leaders we need today and tomorrow to ensure safe and secure cloud...
View ArticleThree Critical Features that Define an Enterprise-Grade Cloud Service
By David BakerThe line between enterprise and consumer is fading as employees work from all manner of devices to access the on-premises, cloud and even consumer applications needed to get work done....
View ArticleHow to Harden Your APIs
By Andy ThuraiThe market for APIs has experienced explosive growth in recent years, yet the major issues that providers still face are protection and hardening of the APIs that they expose to users. In...
View ArticleGoing Up? Safety First, then Send your Data to the Cloud
By Joe SturonasAs the proliferation of data continues to plague businesses, the pressure is on for companies to migrate away from their physical data centers. Cloud computing is being adopted at a...
View ArticleCloud APIs - the Next Battleground for Denial-of-Service Attacks
By Mark O’NeillIn recent months, there have been a number of highly publicized cyber attacks on US banks. These attacks took the form of Distributed De ...
View ArticleCloud-Based Identity Management: Best Practices for Rapid End-User Adoption
By Glenn ChoquetteIdentity Management (IdM) is not new. Yet, after all this time on the market, organizations still have mixed results for end-user adoption, as many organizations that rolled-out IdM...
View ArticleHow to Adopt the Public Cloud While Attaining Private Cloud Control and Security
By Gerry GrealishEarlier this year, McKinsey & Company released an article titled “Protecting information in the cloud,” discussing the increased us ...
View ArticleIdentity Management Plays a Key Role in Mobile Device Management (MDM)
By Dan DagnallAs BYOD and other mobile device related initiatives take hold, sooner rather than later, identity management will once again be considered as an ...
View ArticleSecurity Check List: An Ounce of Prevention is Better than a Pound of Cure
By Wolfgang KandekIt is common belief that buying more robust and expensive security products will offer the best protection from computer-based attacks; that ultimately the expenditure pays off by...
View ArticlePlugging "Cloud Identity Leaks": Why Your Business Should Become an Identity...
By Mark O’NeillMost people have used the Facebook, Twitter, or Google Apps buttons located on websites to log into third-party services. This approach is useful within consumer IT as it enables the...
View ArticleBuilding Trust and Security through Transparency of Service
By David BakerWith the growing movement of enterprises to the cloud, it’s more important than ever that service providers demonstrate and prove good security practices to their customers, in good times...
View ArticleHow the “Internet of Things” Will Feed Cloud Computing’s Next Evolution
By David CanellosWhile the Internet of Things is not a new concept (Kevin Ashton first coined the term in 1999 to describe how the internet is connected to the physical world), it is just now becoming...
View ArticleRethink Cloud Security to Get Ahead of the Risk Curve
By Kurt JohnsonEver since the cloud sprung up to the top of every IT discussion, the issue of cloud security was right alongside it. Let’s face it, enterprise security has never been easy, and the...
View ArticleDon’t Let a Disaster Leave your Data Out in the Cold
By Andrew WildWhen we see images from natural disasters like Hurricane Sandy of flooded neighborhoods, downed power lines and destroyed homes the first concern, of course, is for the safety of the...
View ArticleA Hybrid Approach for Migrating IAM to the Cloud
By Merritt MaximWe continue to hear about how cloud, mobility and the consumerization of IT has the potential to transform business. However, the ongoing hype around these trends may lead some to...
View ArticleIT Opportunities Surrounding Shadow IT
By Kamal ShahThe magnitude of Shadow IT is significant and growing. Gartner has predicted< ...
View ArticleA Prescription for Cloud Data Security for Healthcare Service Providers
By Kamal ShahCloud services are here to stay, and practically everybody is embracing them. In fact, the cloud computing industry is growing at the torrid pace of nearly 30% per year right now,...
View ArticleBeyond Encryption: The 5 Pillars of Cloud Data Security
By Kamal ShahGiven the recent influx of cybersecurity attacks and the hubbub about the National Security Agency’s PRISM program, there is lot of talk about the im ...
View ArticleWatering Hole Attacks: Protecting Yourself from the Latest Craze in Cyber...
By Harold ByunCybercriminals are clever and know how to evolve – you’ve got to give them that. They’ve proven this once again with their latest cyber-attack strategy, the
View ArticleDigital Certificates: Gone in 60 Months or Less
By Gavin HillFor years, cybercriminals have been taking advantage of the blind trust organizations and users place in cryptographic keys and digital certificates. Only now are vendors starting to...
View ArticlePatching the Perpetual MD5 Vulnerability
By Gavin HillEarlier this month, Microsoft updated the security advisory that deprecates the use of MD5 hash algorithms for certificates issued by certification authorities (CA) in the Microsoft root...
View ArticleSSH – Does Your “Cloud Neighbor” Have an Open Backdoor to Your Cloud App?
By Gavin HillSecure Shell (SSH) is the de facto protocol used by millions to authenticate to workloads running in the cloud and transfer data securely. Even more SSH sessions are established...
View ArticleWhat Should Cloud-enabled Data Security Protections Look Like in the Future?
By V.Jay LaRosaWhile listening to one of my favorite podcasts about two months ago, I heard a quote from a man named William Gibson that really resonated with me. He said, "The future is here already,...
View ArticleCloud Collaboration: Maintaining Zero Knowledge across International Boundaries
By Jonathan GohstandThe increasingly global nature of business requires companies to collaborate more and more across borders, exchanging all manner of documents: contracts, engineering documents and...
View ArticleSeeing Through the Clouds
By TK KeaniniThe economics of cyber-attacks have changed over the years. Fifteen years ago, it was all about network penetration, but today advanced attackers are more concerned about being detected....
View ArticleWhy Higher Education Institutions Need Cloud-based Identity Providers
By Dan DagnallFederation is definitely a hot topic these days, with NSTIC attempting to create an identity ecosystem, InCommon continuing to build its service-provider fede ...
View Article