Cloud Computing


5 Ways Schools Can Upgrade Cyber Security

May 06, 2015 Added by:Paul Lipman

Today’s cyber criminals are more aggressive than ever before in their quest to achieve financial gains through hacking. With that being said, it should come as no surprise that our nation's schools are a prime target for such attacks. In this article, iSheriff CEO Paul Lipman highlights the five actions that can be taken to upgrade cyber security practices.

Comments  (0)


Cybersecurity Trends for SMBs: Mobile, Security and the Cloud

April 10, 2015 Added by:Paul Lipman

While SMBs are vulnerable to many of the same types of attacks as the companies making headlines (Target, JP Morgan, Home Depot, Anthem, etc.), they must defend themselves with vastly smaller IT teams and budgets. SMBs are finding they have a unique set of challenges and vulnerabilities that require a comprehensive but tailored approach to security.

Comments  (0)


The Cloud is Covered: VPNs Enhance Data Security in the Cloud

April 08, 2015 Added by:Patrick Oliver Graf

A cloud provider that has to adhere to stringent privacy and compliance regulations typically has more know-how and access to more resources than a small- or medium-size company. But it is just not possible to rely on a cloud provider for every aspect of data security.

Comments  (0)


Tomorrow’s Forecast: Increasing Clouds. Extending Your Secure Identity Environment into the Cloud

April 07, 2015 Added by:Identropy

As more company business units explore and adopt Software as a Service (SaaS) solutions for their technology needs, IT security groups struggle to keep the “gathering clouds” from raining on their secured environment. On the bright side, these organizations have a very strong security foundation in place for internally hosted applications.

Comments  (0)


Security Reviews Critical to Cloud Migration

April 07, 2015 Added by:Brian Prince

Organizations appear to be getting better at understanding the security implications of moving to the cloud through their review processes, according to a new report.

Comments  (0)


Dangers Accelerate: Increasing Global Threats Loom Over Information Security Landscape

March 19, 2015 Added by:Steve Durbin

The pace and scale of information security threats continues to accelerate, endangering the integrity and reputation of today’s most trusted organizations. Attackers have become more organized, attacks are more refined, and all threats are more dangerous, and pose more risks, to an organization’s reputation than ever before.

Comments  (0)


New Facebook Worm Variant Leverages Multiple Cloud Services

March 12, 2015 Added by:Malwarebytes

Social networks are particularly interesting for malware authors because they can be leveraged to spread an infection starting with a single person.

Comments  (4)


The Battle Has Moved to the Endpoints and Beyond

March 11, 2015 Added by:Peter Zavlaris

While organizations may be adding solutions to their arsenals to combat threats at the endpoint, they may want to consider what else constitutes their perimeter.

Comments  (6)


GoDaddy is Just One of the Dominoes That Doesn't Have to Fall

March 10, 2015 Added by:Yair Grindlinger

Cloud security is the responsibility of the enterprise.

Comments  (0)


Owning your own data – Data residency laws

February 26, 2015 Added by:Willy Leichter

A question I get asked a lot at is, “If there is a data center in my region, do I still need to protect my own data if I’m concerned about say data residency laws?”

Comments  (5)


Why Harmonizing Cloud Security Standards will Accelerate Cloud Adoption

February 20, 2015 Added by:Evelyn De Souza

As the public cloud becomes mission-critical, business and government applications, many standards bodies and government entities worldwide are issuing stronger security guidance and new standards.

Comments  (8)


Anthem Breach: How Hackers Stole Credentials and Why Two-Factor Authentication May Help Prevent Future Phishing Scams

February 09, 2015 Added by:Thu Pham

If the Anthem attack was carried out as the result of using a single password, their access security wasn’t up to industry standards. Two-factor authentication may have thwarted attacks by requiring the use of a personal device to verify the identity of a system administrator or other technical employee with access to their database of millions of sensitive records.

Comments  (3)


Fear Hackers? First Invest in an IT Security Culture Change

January 14, 2015 Added by:Kevin L. Jackson

With all the news these days about cyberterrorism and hacking the cloud may seem like the last place you would want to put your precious information.

Comments  (1)


Does Your Valuable Data Belong to Hackers?

January 05, 2015 Added by:Thu Pham

Every organization, regardless of size, is comprised of a variety of sensitive data - from HR and payroll handling medical, financial and personally identifiable employee data to your precious intellectual property. And each of these data types can be sold for a price on the black market, making them valuable to attackers financially as well as for blackmail purposes.

Comments  (6)


Moving from Alert-Driven to Intelligence-Driven Security

January 05, 2015 Added by:Paul Lipman

The emergence of smart, integrated, cloud-based security services will enable a transformation from an alert-centric to an intelligence-centric approach to security. This will vastly enhance the Chief Information Security Officer's (CISO’s) visibility and ultimately deliver substantial improvements in the robustness of the overall security posture.

Comments  (1)


Security in 2015: The Internet Becomes the Corporate Network Perimeter

December 05, 2014 Added by:Paul Lipman

The cloud has been widely hailed as the most disruptive force in modern business. Indeed, the world is in the midst of fundamentally profound transformations, enabled by the cloud, in the ways in which we access and interact with data and applications. Unfortunately, the security industry has not kept pace with these transformational trends, necessitating an equally profound change in the way we s...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »