Quantcast
Channel: Infosecurity - Blog
Browsing all 98 articles
Browse latest View live

Protect the API Keys to your Cloud Kingdom

By Mark O’NeillMuch lip service is paid to protecting information in the C ...

View Article


Five Guidelines for Cloud Computing and Device Security in The “Always Able” Era

By Mark BregmanChief Information Security Officers know instinctively that the world under their purview is undergoing a shift every bit as significant as the rise of the World Wide Web more than 15...

View Article


Who Moved My Cloud?

By Allen AllisonManaged cloud services are quickly being adopted by large enterprises. Organizations are increasingly embracing cloud technologies for core services like financial systems, IT...

View Article

OAuth – authentication and authorization for mobile applications

By Paul MadsenFederation is a model of identity management that distributes the various individual components of an identity operation amongst different actors. The presumption being that the jobs can...

View Article

Security Standards – Why they are so Critical for the Cloud

By Matthew GardinerEveryone loves standards, right? When is the last time you heard a vendor proudly say that their product or service was closed and proprietary? However, it also seems that every time...

View Article


How Public Cloud Providers Can Improve Their Trustworthiness

By Matthew GardinerWhen you meet someone you have never met for the first time, in a place you have never been to, do you trust him? Would you have him hold your wallet for you or would you share some...

View Article

Watch Out for the Top 6 Cloud Gotchas!

 By Margaret DawsonI am a huge proponent of cloud-based solutions, but I also have a bailiwick for people who look to the cloud just for cloud’s sake, and do not take time to do the due diligence....

View Article

Understanding Best-in-Class Cloud Security Measures and How to Evaluate...

 By Fahim SiddiquiDespite a broader interest in cloud computing, many organizations have been reluctant to embrace the technology due to security concerns. While today’s businesses can benefit from...

View Article


PKI Still Matters, Especially in the Cloud

 By: Merritt Maxim Director of IAM Product Marketing CA Technologies Inc.Infosec veterans probably remember (with a smirk) how Public Key Infrastructure (PKI) was heralded as the next “big thing” in...

View Article


Pass the Buck: Who 's Responsible for Security in the Cloud?

By Todd ThiemannCloud computing changes the equation of responsibility and accountability for information security and poses some new challenges for enterprise IT. At Vormetric we are working with...

View Article

Cloud Signaling – The Data Center’s Best Defense

By Rakesh ShahRecent high-profile security incidents heightened awareness of how Distributed Denial of Service (DDoS) attacks can compromise the availability of critical websites, applications and...

View Article

Five Ways to Achieve Cloud Compliance

By Allen Allison With the rapid adoption of cloud computing technologies, IT organizations have found a way to deliver applications and services more quickly and efficiently to their customers,...

View Article

Seven Steps to Securing File Transfer’s Journey to the Cloud

By Oded Valin“When it absolutely, positively has to be there overnight.” There’s a lot we can identify with when it comes to reciting FedEx’s famous slogan, especially as it relates to modern file...

View Article


The “Don’t Trust Model” of Cloud Computing

By Ed KingThe elephant in the room when it comes to barriers to the growth and adoption of cloud computing by enterprises is the lack of trust held for cloud service providers. Enterprise IT has...

View Article

Securing Your File Transfer in the Cloud

By Stuart LiskFile transfer has been around since the beginning of time. Ok, well maybe that is an exaggeration, but the point is, file transfer was one of the earliest uses of “network” computing...

View Article


When It Comes To Cloud Security, Don’t Forget SSL

By Michael Lin, SymantecCloud computing appears here to stay, bringing with it new challenges and security risks on one hand, while on the other hand boasting efficiencies, cost savings and competitive...

View Article

Test Accounts: Another Compliance Risk

By Merritt MaximiA major benefit associated with deploying identity management and/or identity governance into an organization is that these solutions provide the ability to detect and remove orphan...

View Article


Cloud Security: Confident, Fearful, or Surprised?

By Ken BieryThis two-part guest blog series explores the topic of cloud security. Part one of the series focuses on the questions enterprise IT decision makers should ask when considering moving...

View Article

Leveraging Managed Cloud Services to Meet Cloud Compliance Challenges

By Allen AllisonRegardless of your industry, customer base, or product, it is highly likely that you face regulatory compliance requirements. If you handle Protected Health Information (PHI), the...

View Article

Cloud Security Considerations

By Ken BieryCan a cloud be as secure as a traditional network? In a word, yes! I agree that some may find this statement surprising. Depending on the network, that may be a low bar, but good security...

View Article
Browsing all 98 articles
Browse latest View live