May 20, 2011 Added by:Rahul Neel Mani
Amazon needs to spend time with IT professionals and put in place the right processes, hence, minimizing the risks. They also have to put in place new data centers and improve redundancy for risk management. Risks have to be covered...
May 19, 2011 Added by:David Navetta
A majority of cloud computing providers surveyed do not believe their organization views security as a competitive advantage. Further, they do not consider security as an important responsibility and do not believe they adequately secure the confidential information of their customers...
May 17, 2011 Added by:Ben Kepes
The actions of LastPass have been exemplary – the actual loss in this instance was either non-existent or negligible. Many larger companies would have simply brushed this under the table and perhaps introduced some new security measures under the cloak of a version update...
May 11, 2011 Added by:Global Knowledge
Attempting the new exam offers the opportunity to become certified on the latest and greatest version of the test and, after all, almost everyone likes something new. So here’s my question to each of you: When such situations arise which exam would you plan to attempt?
May 09, 2011 Added by:Bill Gerneglia
Think about the business terminology that preceded the notion of cloud computing and networking - token ring networks, Ethernet, distributed applications, Arpanet, SaaS - SOA, virtualization, horizontal scaling and the internet itself. The cloud is not a revolution, but an evolution...
May 02, 2011 Added by:PCI Guru
Epsilon appears to have caught this breach quickly because they were monitoring their network systems. What this incident points out is that even when you are monitoring your environment, it still takes a while to recognize that a breach is in progress...
May 02, 2011 Added by:Ben Kepes
Cloud vendors are quick to point out how reliable their data centers are with redundant communication channels, power supply structures and the like. Any application running on the clouds needs to consider the same issues – it is unrealistic to rely completely on one single data center...
April 27, 2011 Added by:John Nicholson
There are risks associated with allowing your data and applications to sit somewhere else, and some of these risks become more pronounced when you are operating in a cloud-based environment with little assurance about the physical location of your data. However, these risks can be managed...
April 17, 2011 Added by:Ben Kepes
Aspects of this discussion are little more than cloud elites arguing finer points. There are some issues in the message used to justify the cloud to enterprises. We need to have a consistent story about what the cloud really means for an enterprise – something that is sadly lacking today...
April 14, 2011 Added by:Lindsay Walker
Every workplace has "super-users," people who can hack into systems and extract sensitive information. Having information stored offsite makes it challenging for anyone inside your organization to get their eyes on information they aren't permitted to see...
April 14, 2011 Added by:Marjorie Morgan
Economics are driving both industry and government to adopt increasingly sophisticated technologies which raise serious new security issues. It is simply dangerous to suggest that the problems can be managed with a set of government determined technical standards...
April 10, 2011 Added by:Allan Pratt, MBA
What were the service level agreements, and did they outline precautions that Epsilon would take to prevent such incursions? If none of this information was included in the SLAs, perhaps, it’s time for data-driven companies to include their information security strategies in SLAs...
April 05, 2011 Added by:Ben Kepes
Unfortunately, in the light of what can only be called FUD on the part of more traditional vendors, it is natural that those building clouds in the most efficient (read cheapest) of ways, fight back against some of that spin...
April 04, 2011 Added by:Headlines
The company states that their systems experienced and unauthorized access event that has exposed the names and email addresses of the customers the company's clients serve. Initial reports indicate that no financial data was revealed in the breach...
April 03, 2011 Added by:Rahul Neel Mani
IT is challenged today to re-energize the data center to readily accommodate changing business requirements and demands for always-accessible information. The challenge lies in making information both available and secure...
April 01, 2011 Added by:Simon Heron
This scam involves fraudsters cold calling people claiming to be a Windows support tech and getting the victim to give them remote access to their PCs in the guise of helping them ‘cleanse’ their systems – as long as the victim hands over money or in some cases much more...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013