Cloud Computing

65c1700fde3e9a94cc060a7e3777287c

The Road To Identity Relationship Management

November 04, 2013 Added by:Simon Moffatt

The modern enterprise workforce, will contain contractors, freelancer and even consumers themselves. Bloggers, reviewers, supporters, promoters, content sharers and affiliates, whilst not on the company payroll, help drive revenue through messaging and interaction. If a platform exists where their identity can be harnessed, a new more agile go to market approach can be developed.

Comments  (0)

3071bd3c5c013c8c3defcccad0259c16

Encrypting Data At Rest Or In The Cloud: Is It Value Adding?

October 16, 2013 Added by:Hani Banayoti

Consider encryption at rest but make informed decisions about its value and protection afforded.

Comments  (2)

369dec31d888693bba6b6e0f39c14ce3

The Cloud Problem – How Security Pros Can Migrate and Maintain Security

September 25, 2013 Added by:Matt Neely

Unlike traditional third-party solutions where the vendor is responsible for all or most of the security controls in the cloud, there are often cases where security professionals are responsible for managing and maintaining key security controls.

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Top Secret SCI Jobs - The Value of Smaller Contractors

July 30, 2013 Added by:Jon Stout

You can be doing all the right things, adding immense value to your customer and helping your company build a great brand. When a contract changes even incumbents are suddenly “on the bench” or “between projects” or “on overhead” . You are no longer billable. As a result you have now moved from a profit-generator to a cost center. When this happens you are at risk.

Comments  (0)

483d57221cc733958be20869f1c7e400

Achieving Code Compliance in an Agile Environment

July 18, 2013 Added by:Phil Cox

You can have compliance in agile environments. Take the time to do it right and you’ll reap the benefits of both compliance and agile development.

Comments  (2)

65c1700fde3e9a94cc060a7e3777287c

2-Factor Is Great, But Passwords Still Weak Spot

July 17, 2013 Added by:Simon Moffatt

Two factor authentication solutions have been around for a number of years. While these additional processes certainly go some way to improve security, and reduce the significance of the account password, it highlights a few interesting issues, mainly that password based authentication is still a weak link.

Comments  (0)

D2c1e74cac8f12e965acd1a21fef3a38

Mitigate Security Risk Before Your Business Collapses

July 11, 2013 Added by:Jan Valcke

Security is not an optional feature to be implemented after the horse has bolted. Lack of security may have severe consequences and can result in destructed corporate image, severe revenue losses and liability suits. Strong authentication alleviates a lot of security concerns and can help build customer trust, credibility and can even become a competitive advantage.

Comments  (0)

Ee445365f5f87ac6a6017afd9411a04a

What Magneto's Helmet and Non-ICFR SSAE 16 Controls have in Common

July 04, 2013 Added by:Jon Long

Recently I have had opportunities to observe several auditors defend why they believe the controls contained in their client's SSAE 16 reports are relevant to internal controls over financial reporting (ICFR).

Comments  (0)

483d57221cc733958be20869f1c7e400

HIPAA in Public Cloud: The Rules Have Been Set

July 03, 2013 Added by:Phil Cox

On January 25, 2013, the U.S. Department of Health and Human Services (HHS) released the Omnibus Rule, which finalized all the former interim rules for Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health (HITECH) compliance.

Comments  (0)

Default-avatar

Trend Spotting @BlackHatEvents: Did I Mention the Irony @BrianKrebs is Bringing?

July 01, 2013 Added by:Joe Franscella

How often do cybersecurity reporters like to tell attack victims' stories? How often are victims willing to go on record about them? Answers: frequently and never.

Comments  (0)

483d57221cc733958be20869f1c7e400

Five Factors InfoSec Teams Should Consider When Deploying to the Cloud

June 28, 2013 Added by:Phil Cox

Anybody who works with central IT staff at larger enterprises recognize the common questions around security and compliance from professional InfoSec teams. Here are some of the general guidelines that all InfoSec departments should consider when thinking about cloud deployments.

Comments  (0)

8a958994958cdf24f0dc051edfe29462

Cyber Attacks the Reality, the Reason and the Resolution Part 3

June 24, 2013 Added by:Larry Karisny

Knowing the reality and reasons behind cyberattacks, it’s time to stop talking and start offering resolution to these serious problems. There is no "it won’t happen to me" anymore. We must immediately deploy prevention and detection technologies to our critical processes or frankly, we could lose it all.

Comments  (0)

65c1700fde3e9a94cc060a7e3777287c

Identity & Access Management: Give Me a REST

June 19, 2013 Added by:Simon Moffatt

RESTful architectures have been the general buzz of websites for the last few years. The simplicity, scalability and statelessness of this approach to client-server communications has been adopted by many of the top social sites such as Twitter and Facebook. Why? Well, in their specific cases, developer adoption is a huge priority.

Comments  (0)

890b3a52d134186c048e1d845daae070

From the SMB to Security Guru: Five Ways IT Pros Can Manage Security on a Budget

June 14, 2013 Added by:Vinod Mohan

Given the expanding threat landscape for the SMB and the increased demand for affordable IT security tools, here are five valuable tips for IT pros that help shed light on managing enterprise security on a budget.

Comments  (0)

Ee445365f5f87ac6a6017afd9411a04a

Irregardless, Begs the Question, and SSAE 16 Certified

June 04, 2013 Added by:Jon Long

"Irregardless" is not a word, and is not a substitute for irrespective or regardless. "Begging the question" is a logical fallacy, not a substitute for "...which raises the question...", and there is no such thing as an "SSAE 16 certification".

Comments  (0)

8a958994958cdf24f0dc051edfe29462

Google: Black Hat or White Hat?

April 23, 2013 Added by:Larry Karisny

Google has a perfect opportunity to be a leader in cybersecurity. Google’s recent network -- and acquisitions and hires -- in Austin, Texas, is an opportunity to do security right the first time.

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »