Certifiable in the Cloud
By Pamela FuscoCloud computing remains as much a mystery to some as it is a part of others’ daily lexicon. I spend a lot of time working with people who have connections to various offices of the US...
View ArticleWill the Cloud Cause the Reemergence of Security Silos?
By Matthew GardinerGenerally speaking, in the world silos relate to things that are beneficial, such as silos for grain or corn. In the world of IT security, however, silos are very bad. In many...
View ArticleNeuroprivilogy: The New Frontier of Cyber Crime
By Shlomi DinoorIs your Neuroprivilogy vulnerable? The answer is most probably yes, you simply have no clue what Neuroprivilogy is (yet)…The first step of this discussion is defining a fancy term to...
View ArticleMoving to a “Show Me” State – Gaining Control and Visibility in Cloud Services
By Eric BaizeIn Survey after survey, security and more specifically ...
View ArticleMoving to the Cloud? Take Your Application Security With You
By Bill PenningtonCloud computing is becoming a fundamental part of information technology. Nearly every enterprise is evaluating or deploying cloud solutions. Even as business managers turn to the...
View ArticleBuilding a Secure Future in the Cloud
By Mark BregmanCloud computing offers clear and powerful benefits to IT organizations of all sizes, but the path to cloud computing – please excuse the pun – is often cloudy.With cloud computing, IT...
View ArticleExtend the Enterprise into the Cloud with Single Sign-On to Cloud-Based Services
By Mark O’NeillIn this blog post we examine how Single Sign-On from the enterprise to Cloud-based services is enabled. Single Sign-On is a critical component for any organization wishing to leverage...
View ArticleTop Six Security Questions Every CIO Should Ask a Cloud Vendor
By Ian HuynhCloud computing has become an integrated part of IT strategy for companies in every sector of our economy. By 2012, IDC predicts that IT spending on cloud services will grow almost...
View ArticleAnd the Thunder Rolls: All the Noise about Cloud and What that Means When...
By Allen AllisonDisaster Recovery (DR) and Business Continuity Planning (BCP) continue to be driving factors for some organizations looking to move to the cloud. Many are looking to manage their...
View ArticleTrusted Client to Cloud Access
By Vikas JainCloud computing has become an integral part of all IT decision making today across industries and geographies. This market is growing at a rapid pace. By 2014, IDC e ...
View ArticleNavigating Cloud Application Security: Myths vs. Realities
By Chris WysopalDevelopers and IT departments are being told they need to move applications to the cloud and are often left on their own to navigate the challenges related to developing and managing...
View ArticleCloud Security: The Identity Factor
By Patrick HardingThe Problem with PasswordsThe average enterprise employee uses 12 userid/password pairs for accessing the many applications required to perform his or her job (Osterman Research...
View ArticleThree Cloud-Computing Data Security Risks That Can’t be Overlooked
By Slavik MarkovichThe move to cloud computing brings with it a number of attributes that require special consideration when it comes to securing data. And since in nearly every organization, their...
View ArticleHey, You, Get off of My Cloud
By Allen AllisonThe emerging Public Cloud versus Private Cloud debate is not just about which solution is best. It extends to the very definition of cloud. I won’t pretend that my definitions of public...
View Article[How to] Be Confident When Storing Information in the Cloud
By Anil Chakravarthy and Deepak MohanOver the past few years, information explosion has inhibited organizations’ ability to effectively secure, manage and recover data. This complexity is only...
View ArticleDebunking the Top Three Cloud Security Myths
By Margaret DawsonThe “cloud” is one of the most discussed topics among IT professionals today, and organizations are increasingly exploring the potential benefits of using cloud computing or solutions...
View ArticlePrivileged Administrators and the Cloud: Who will Watch the Watchmen?
By Matthew GardinerOne of the key advantages of the cloud, whether public or private, flows from a well-known econometric concept known as “economies of scale.” The concept of economies of scale refers...
View ArticleCloud Annexation
By Stephen R Carter The Cloud is the next evolutionary step in the life of the Internet. From the experimental ARPANET (Advanced Research Projects Agency Network) to the Internet to the Web – and now...
View ArticleConstant Vigilance
By Jon Heimerl Constant Vigilance. Mad-Eye Moody puts it very well. Constant Vigilance.Unfortunately, these days we need constant vigilance to help protect ourselves and companies from peril. Th ...
View ArticleIs Tokenization or Encryption Keeping You Up at Night?
By Stuart Lisk, Senior Product Manager, HubspanAre you losing sleep over whether to implement tokenization or full encryption as your cloud security methodology? Do you find yourself lying awake...
View Article