Protect the API Keys to your Cloud Kingdom
By Mark O’NeillMuch lip service is paid to protecting information in the C ...
View ArticleFive Guidelines for Cloud Computing and Device Security in The “Always Able” Era
By Mark BregmanChief Information Security Officers know instinctively that the world under their purview is undergoing a shift every bit as significant as the rise of the World Wide Web more than 15...
View ArticleWho Moved My Cloud?
By Allen AllisonManaged cloud services are quickly being adopted by large enterprises. Organizations are increasingly embracing cloud technologies for core services like financial systems, IT...
View ArticleOAuth – authentication and authorization for mobile applications
By Paul MadsenFederation is a model of identity management that distributes the various individual components of an identity operation amongst different actors. The presumption being that the jobs can...
View ArticleSecurity Standards – Why they are so Critical for the Cloud
By Matthew GardinerEveryone loves standards, right? When is the last time you heard a vendor proudly say that their product or service was closed and proprietary? However, it also seems that every time...
View ArticleHow Public Cloud Providers Can Improve Their Trustworthiness
By Matthew GardinerWhen you meet someone you have never met for the first time, in a place you have never been to, do you trust him? Would you have him hold your wallet for you or would you share some...
View ArticleWatch Out for the Top 6 Cloud Gotchas!
By Margaret DawsonI am a huge proponent of cloud-based solutions, but I also have a bailiwick for people who look to the cloud just for cloud’s sake, and do not take time to do the due diligence....
View ArticleUnderstanding Best-in-Class Cloud Security Measures and How to Evaluate...
By Fahim SiddiquiDespite a broader interest in cloud computing, many organizations have been reluctant to embrace the technology due to security concerns. While today’s businesses can benefit from...
View ArticlePKI Still Matters, Especially in the Cloud
By: Merritt Maxim Director of IAM Product Marketing CA Technologies Inc.Infosec veterans probably remember (with a smirk) how Public Key Infrastructure (PKI) was heralded as the next “big thing” in...
View ArticlePass the Buck: Who 's Responsible for Security in the Cloud?
By Todd ThiemannCloud computing changes the equation of responsibility and accountability for information security and poses some new challenges for enterprise IT. At Vormetric we are working with...
View ArticleCloud Signaling – The Data Center’s Best Defense
By Rakesh ShahRecent high-profile security incidents heightened awareness of how Distributed Denial of Service (DDoS) attacks can compromise the availability of critical websites, applications and...
View ArticleFive Ways to Achieve Cloud Compliance
By Allen Allison With the rapid adoption of cloud computing technologies, IT organizations have found a way to deliver applications and services more quickly and efficiently to their customers,...
View ArticleSeven Steps to Securing File Transfer’s Journey to the Cloud
By Oded Valin“When it absolutely, positively has to be there overnight.” There’s a lot we can identify with when it comes to reciting FedEx’s famous slogan, especially as it relates to modern file...
View ArticleThe “Don’t Trust Model” of Cloud Computing
By Ed KingThe elephant in the room when it comes to barriers to the growth and adoption of cloud computing by enterprises is the lack of trust held for cloud service providers. Enterprise IT has...
View ArticleSecuring Your File Transfer in the Cloud
By Stuart LiskFile transfer has been around since the beginning of time. Ok, well maybe that is an exaggeration, but the point is, file transfer was one of the earliest uses of “network” computing...
View ArticleWhen It Comes To Cloud Security, Don’t Forget SSL
By Michael Lin, SymantecCloud computing appears here to stay, bringing with it new challenges and security risks on one hand, while on the other hand boasting efficiencies, cost savings and competitive...
View ArticleTest Accounts: Another Compliance Risk
By Merritt MaximiA major benefit associated with deploying identity management and/or identity governance into an organization is that these solutions provide the ability to detect and remove orphan...
View ArticleCloud Security: Confident, Fearful, or Surprised?
By Ken BieryThis two-part guest blog series explores the topic of cloud security. Part one of the series focuses on the questions enterprise IT decision makers should ask when considering moving...
View ArticleLeveraging Managed Cloud Services to Meet Cloud Compliance Challenges
By Allen AllisonRegardless of your industry, customer base, or product, it is highly likely that you face regulatory compliance requirements. If you handle Protected Health Information (PHI), the...
View ArticleCloud Security Considerations
By Ken BieryCan a cloud be as secure as a traditional network? In a word, yes! I agree that some may find this statement surprising. Depending on the network, that may be a low bar, but good security...
View Article