Quantcast
Channel: Infosecurity - Blog
Browsing all 98 articles
Browse latest View live

Certifiable in the Cloud

By Pamela FuscoCloud computing remains as much a mystery to some as it is a part of others’ daily lexicon. I spend a lot of time working with people who have connections to various offices of the US...

View Article


Will the Cloud Cause the Reemergence of Security Silos?

By Matthew GardinerGenerally speaking, in the world silos relate to things that are beneficial, such as silos for grain or corn. In the world of IT security, however, silos are very bad. In many...

View Article


Neuroprivilogy: The New Frontier of Cyber Crime

By Shlomi DinoorIs your Neuroprivilogy vulnerable? The answer is most probably yes, you simply have no clue what Neuroprivilogy is (yet)…The first step of this discussion is defining a fancy term to...

View Article

Moving to a “Show Me” State – Gaining Control and Visibility in Cloud Services

By Eric BaizeIn Survey after survey, security and more specifically ...

View Article

Moving to the Cloud? Take Your Application Security With You

By Bill PenningtonCloud computing is becoming a fundamental part of information technology. Nearly every enterprise is evaluating or deploying cloud solutions. Even as business managers turn to the...

View Article


Building a Secure Future in the Cloud

By Mark BregmanCloud computing offers clear and powerful benefits to IT organizations of all sizes, but the path to cloud computing – please excuse the pun – is often cloudy.With cloud computing, IT...

View Article

Extend the Enterprise into the Cloud with Single Sign-On to Cloud-Based Services

 By Mark O’NeillIn this blog post we examine how Single Sign-On from the enterprise to Cloud-based services is enabled. Single Sign-On is a critical component for any organization wishing to leverage...

View Article

Top Six Security Questions Every CIO Should Ask a Cloud Vendor

By Ian HuynhCloud computing has become an integrated part of IT strategy for companies in every sector of our economy. By 2012, IDC predicts that IT spending on cloud services will grow almost...

View Article


And the Thunder Rolls: All the Noise about Cloud and What that Means When...

By Allen AllisonDisaster Recovery (DR) and Business Continuity Planning (BCP) continue to be driving factors for some organizations looking to move to the cloud. Many are looking to manage their...

View Article


Trusted Client to Cloud Access

By Vikas JainCloud computing has become an integral part of all IT decision making today across industries and geographies. This market is growing at a rapid pace. By 2014, IDC e ...

View Article

Navigating Cloud Application Security: Myths vs. Realities

By Chris WysopalDevelopers and IT departments are being told they need to move applications to the cloud and are often left on their own to navigate the challenges related to developing and managing...

View Article

Cloud Security: The Identity Factor

By Patrick HardingThe Problem with PasswordsThe average enterprise employee uses 12 userid/password pairs for accessing the many applications required to perform his or her job (Osterman Research...

View Article

Three Cloud-Computing Data Security Risks That Can’t be Overlooked

 By Slavik MarkovichThe move to cloud computing brings with it a number of attributes that require special consideration when it comes to securing data. And since in nearly every organization, their...

View Article


Hey, You, Get off of My Cloud

By Allen AllisonThe emerging Public Cloud versus Private Cloud debate is not just about which solution is best. It extends to the very definition of cloud. I won’t pretend that my definitions of public...

View Article

[How to] Be Confident When Storing Information in the Cloud

By Anil Chakravarthy and Deepak MohanOver the past few years, information explosion has inhibited organizations’ ability to effectively secure, manage and recover data. This complexity is only...

View Article


Debunking the Top Three Cloud Security Myths

By Margaret DawsonThe “cloud” is one of the most discussed topics among IT professionals today, and organizations are increasingly exploring the potential benefits of using cloud computing or solutions...

View Article

Privileged Administrators and the Cloud: Who will Watch the Watchmen?

By Matthew GardinerOne of the key advantages of the cloud, whether public or private, flows from a well-known econometric concept known as “economies of scale.” The concept of economies of scale refers...

View Article


Cloud Annexation

By Stephen R Carter The Cloud is the next evolutionary step in the life of the Internet. From the experimental ARPANET (Advanced Research Projects Agency Network) to the Internet to the Web – and now...

View Article

Constant Vigilance

By Jon Heimerl  Constant Vigilance. Mad-Eye Moody puts it very well. Constant Vigilance.Unfortunately, these days we need constant vigilance to help protect ourselves and companies from peril. Th ...

View Article

Is Tokenization or Encryption Keeping You Up at Night?

By Stuart Lisk, Senior Product Manager, HubspanAre you losing sleep over whether to implement tokenization or full encryption as your cloud security methodology? Do you find yourself lying awake...

View Article
Browsing all 98 articles
Browse latest View live