Cloud Computing

8a958994958cdf24f0dc051edfe29462

Google: Black Hat or White Hat?

April 23, 2013 Added by:Larry Karisny

Google has a perfect opportunity to be a leader in cybersecurity. Google’s recent network -- and acquisitions and hires -- in Austin, Texas, is an opportunity to do security right the first time.

Comments  (1)

65c1700fde3e9a94cc060a7e3777287c

Protect Data Not Devices?

April 05, 2013 Added by:Simon Moffatt

As the devices becomes smarter, greater emphasis is placed on the data and services those devices access. Smartphones today come with a healthy array of encryption features, remote backup, remote data syncing for things like contacts, pictures and music, as well device syncing software like Dropbox. How much data is actually specifically related to the device?

Comments  (0)

68b48711426f3b082ab24e5746a66b36

These Cloud and Big Data Things are REALLY Cool

January 29, 2013 Added by:Fergal Glynn

Technology, if used correctly and done in a collaborative manner can be incredibly powerful. It can help answer questions that otherwise would go unanswered. It has helped solve medical issues, predict an election with a high degree of accuracy, and enabled developers worldwide to identify software flaws...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Banking 2.0 and The Future of Bank Branches

January 29, 2013 Added by:Ben Kepes

Banks have a unique opportunity here – they have existing bricks and mortar, they have a deep insight into customer behaviour and they have the resource to really drive an expensive change in their industry – all they need now is the vision, the appetite for self-disruption and a focus on innovation. Exciting times...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

CISO Challenges: The Build vs. Buy Problem (2:2)

January 24, 2013 Added by:Rafal Los

In order to not incur additional risk to the business, the organization being outsourced to must be heavily vetted and contractually obligated to maintain secrecy and integrity. It can be done, but it's tricky, and requires work in due-diligence to ensure the result isn't a train wreck during a worst-case scenario...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Cloud App Integration: Incredibly Important, But Also Problematic

January 22, 2013 Added by:Ben Kepes

As we move into the cloud-dominated world, the issue of integration is more prominent as enterprises realize how many different systems are being used throughout their organizations. While one of the best things about cloud is the democratization of technology, this is also one of the most problematic areas...

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

CISO Challenges: The Build vs. Buy Problem (1:2)

January 21, 2013 Added by:Rafal Los

Change control, application security reviews, incident response, policy review, audit preparation, acquisition due-diligence... all of these require people, money and time - but you've got it all in short supply. Here's one way of looking at making the decision of what to build, and what to outsource...

Comments  (0)

F66c1a87a8db2cb584b4e06e93a84ce3

Dismantling cyber warfare on “3 troubling cyber scenarios worth discussing”

January 17, 2013 Added by:Mikko Jakonen

The set of TTP:s involved with cyber capabilities shall require, for time being, a vast amount of information exploitation, intelligence, development and co-ordination capabilities that enters step-by-step within the theater of operations.

Comments  (1)

8a958994958cdf24f0dc051edfe29462

Common Sense Cybersecurity

January 13, 2013 Added by:Larry Karisny

We start with one big problem. Internet architecture was never made for security. One of my earliest articles quoted the father of the Internet Vint Cerf by saying, "One of things incumbent on all of us is to introduce strong authentication into the fabric of the smart grid. We did not do that with the Internet."

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Actual Cloud – The One To Chose

January 07, 2013 Added by:Ben Kepes

I’ve been a part of, or at least a witness to, a huge number of battles about what constitutes the “real cloud.” These battles seem to generally be fought on a Sunday afternoon U.S. time – that kind of suits me fine because it means the Monday mornings in my time zone have enough entertainment value to get me up and going.

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

On Cloud Adoption

January 02, 2013 Added by:Ben Kepes

One of my regular themes when talking about the cloud are the barriers to adoption or, to put it more coarsely, how we can remove the friction and allow more organizations to enjoy the benefits that the cloud can bring. It’s an area that a number of my colleagues talk about also – we pundits have the advantage of time to explore and enjoy the benefits that cloud brings, but we remain aware of ...

Comments  (0)

65c1700fde3e9a94cc060a7e3777287c

The Obligatory 2013 Infosec Predictions Post

December 26, 2012 Added by:Simon Moffatt

Technology evolves so quickly that 12 weeks is an age when it comes to new ideas and market changes - and security is no different. However, the main areas I will personally be following with interest though, will be the BYOD/BYOA, personnel, preemptive security and social intelligence...

Comments  (0)

E85787adcaf7bca10e799cfd1cfd08f1

Mobile Devices get means for Tamper-Evident Forensic Auditing

December 13, 2012 Added by:Michelle Drolet

In order to detect security breaches and guarantee compliance, tamper “proofing” has not been sufficient. When it comes time for a forensic audit, the ability to detect unauthorized changes to digital files becomes invaluable in an investigation...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

The Dutch, the Yanks, the Cloud and YOU

December 13, 2012 Added by:Don Eijndhoven

Recently a research project by the Amsterdam University [PDF Alert] revealed that US law allows for the US government to access information stored in the Cloud, by (ab)using the PATRIOT act...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

If IaaS is Going to be Heterogeneous, PaaS Will be Even More So

December 13, 2012 Added by:Ben Kepes

It’s something I’m actually quite passionate about – not using management tools that force business units to adopt a particular solution that may or may not really meet their needs. It makes no sense and actually hampers the ability for cloud to deliver the benefits it promises...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

CloudBeat 2012 - "Whose job is cloud security?"

December 11, 2012 Added by:Rafal Los

People are still stuck on authentication, mainly passwords. We as an industry or customer base haven't been very good at figuring out how to manage identities, without sticking our customers with a million different sites which don't share common identities...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »