Cloud Computing


Phones, Phablets and Clouds - Securing Today’s New Infrastructure

December 03, 2014 Added by:Steve Durbin

Despite the undeniable corporate and consumer interest, the security and privacy implications of cloud and mobile connected devices are concerning many security professionals. Countless organizations are still playing catch up – Bring Your Own Device (BYOD) polices are only starting to be embedded, reviewed and updated. IT departments are overwhelmed with the amount of devices entering the workp...

Comments  (0)


Can Hackers Get Past Your Password?

November 05, 2014 Added by:Steve Durbin

Password-based authentication is easy and familiar for customers, and is initially inexpensive for organizations to deploy at scale. But, while password-based authentication may be appropriate in some instances, it is no longer suitable for the wide range of services where it is currently being used.

Comments  (2)


Security and the Cloud: Closing the Gap as the Market Grows

September 22, 2014 Added by:John Hawkins

Many IT decision makers feel pressure to adopt the cloud for the sake of not being left behind. But moving to the cloud is usually easier said than done.

Comments  (0)


Event Preview: Suits and Spooks London: Sept. 12, 2014

September 03, 2014 Added by:Eduard Kovacs

The first European edition of Suits and Spooks, the cyber security conference that brings together decision makers and influential thought leaders in the industry, will be held in London on September 12.

Comments  (0)


National Cybersecurity = Cloud Computing Security

August 13, 2014 Added by:Kevin L. Jackson

A recent article article claimed that the percentage of U.S. small businesses using cloud computing is expected to more than double during the next six years, from 37 percent to nearly 80 percent.

Comments  (0)


EBS Encryption: Enhancing the Amazon Web Services Offering with Key Management

July 23, 2014 Added by:Gilad Parann-Nissany

Full disk encryption is becoming more and more popular in cloud settings, and some of the smaller clouds like Google Compute Engine have supported it for a while. Amazon is a bit late to this game, and should lead the way in enabling customer control of encryption keys.

Comments  (1)


Key Management in the Public Cloud

June 27, 2014 Added by:HyTrust

Key management is the most important component in any enterprise-grade encryption system. Yet what is the right key management model if you are looking to the cloud?

Comments  (0)


Big Data's Big Promise Isn't Here Yet

June 24, 2014 Added by:Tripwire Inc

What is interesting to me is how much hope people have for big data being the savior of the security world. I don’t believe that’s going to happen anytime soon.

Comments  (0)


Two Signs You Should Invest in Cloud Computing Data Security

June 23, 2014 Added by:CipherCloud

The cloud is great, and the cloud is here to stay. But to enable a successful, secure cloud deployment, you'll need to rethink your existing security strategy.

Comments  (0)


An Interview with Johan Hybinette

June 16, 2014 Added by:Robb Reck

Johan has served as the CISO and CTO for Schryver Medical for the past five years, and has just accepted the opportunity to join, located just off I-25, in the old Gates Factory.

Comments  (0)


NSA vs. Cloud Encryption: Which is Stronger?

April 12, 2014 Added by:Gilad Parann-Nissany

The NSA is powerful: they watch, they listen, they collect data. In cases of national security, perhaps this is a good method to catch terrorists. In cases of private business data, there is a way to block the NSA from getting to your sensitive information: strong data encryption.

Comments  (0)


Pros and Cons of US-Based Cloud Services

March 31, 2014 Added by:Gilad Parann-Nissany

Any company or individual using cloud services today should encrypt data in addition to their firewall, anti-virus and other security measures. Incidentally, it is also encouraged by regulation in several sensitive sectors, notably businesses in the health industry under HIPAA patient and data privacy laws and the payment card industry under PCI DSS standards.

Comments  (0)


We Have to Find Ways to Reinforce Trust

March 29, 2014 Added by:Jarno Limnéll

We are losing the battle for cyberspace. Not because malicious actors are taking over the digital world, but because we are forgetting what is the element that makes us feel safe and secure in any world: the ability to trust.

Comments  (0)


BYOD For Government?

March 23, 2014 Added by:Cam Roberson

BYOD is fast becoming the norm for many enterprises, despite the security risks. Government agencies have been slower to adopt, but will need to start implementing policies that address BYOD.

Comments  (1)


PerspecSys Survey Reveals Cloud-based Security Concerns for 2014

March 10, 2014 Added by:Kevin L. Jackson

After polling 130 security professionals on the show floor of the RSA Conference, PerspecSys found that "an overwhelming 74 percent believe security for cloud-based data in 2014 will be a bigger concern than securing data on-premise."

Comments  (0)


NCOIC Debuts Roadmap for Designing, Managing Cyber-secure Hybrid Computing Environment

March 05, 2014 Added by:Kevin L. Jackson

Known as the NCOIC Rapid Response Capability (NRRC™), the process defines how to build a federated cloud infrastructure that provides a foundation for information sharing within a secure environment

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »