Cloud Computing

Af7244bb99debb4a1152fa49a993a05c

Event Preview: Suits and Spooks London: Sept. 12, 2014

September 03, 2014 Added by:Eduard Kovacs

The first European edition of Suits and Spooks, the cyber security conference that brings together decision makers and influential thought leaders in the industry, will be held in London on September 12.

Comments  (0)

21d6c9b1539821f5afbd3d8ce5d96380

National Cybersecurity = Cloud Computing Security

August 13, 2014 Added by:Kevin L. Jackson

A recent article Inc.com article claimed that the percentage of U.S. small businesses using cloud computing is expected to more than double during the next six years, from 37 percent to nearly 80 percent.

Comments  (0)

B742830daed9314883a0edc63daefc42

EBS Encryption: Enhancing the Amazon Web Services Offering with Key Management

July 23, 2014 Added by:Gilad Parann-Nissany

Full disk encryption is becoming more and more popular in cloud settings, and some of the smaller clouds like Google Compute Engine have supported it for a while. Amazon is a bit late to this game, and should lead the way in enabling customer control of encryption keys.

Comments  (1)

Dea535178c7cc66cd64a57946b006ef2

Key Management in the Public Cloud

June 27, 2014 Added by:HyTrust

Key management is the most important component in any enterprise-grade encryption system. Yet what is the right key management model if you are looking to the cloud?

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Big Data's Big Promise Isn't Here Yet

June 24, 2014 Added by:Tripwire Inc

What is interesting to me is how much hope people have for big data being the savior of the security world. I don’t believe that’s going to happen anytime soon.

Comments  (0)

Default-avatar

Two Signs You Should Invest in Cloud Computing Data Security

June 23, 2014 Added by:CipherCloud

The cloud is great, and the cloud is here to stay. But to enable a successful, secure cloud deployment, you'll need to rethink your existing security strategy.

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

An Interview with Johan Hybinette

June 16, 2014 Added by:Robb Reck

Johan has served as the CISO and CTO for Schryver Medical for the past five years, and has just accepted the opportunity to join Hosting.com, located just off I-25, in the old Gates Factory.

Comments  (0)

B742830daed9314883a0edc63daefc42

NSA vs. Cloud Encryption: Which is Stronger?

April 12, 2014 Added by:Gilad Parann-Nissany

The NSA is powerful: they watch, they listen, they collect data. In cases of national security, perhaps this is a good method to catch terrorists. In cases of private business data, there is a way to block the NSA from getting to your sensitive information: strong data encryption.

Comments  (0)

B742830daed9314883a0edc63daefc42

Pros and Cons of US-Based Cloud Services

March 31, 2014 Added by:Gilad Parann-Nissany

Any company or individual using cloud services today should encrypt data in addition to their firewall, anti-virus and other security measures. Incidentally, it is also encouraged by regulation in several sensitive sectors, notably businesses in the health industry under HIPAA patient and data privacy laws and the payment card industry under PCI DSS standards.

Comments  (0)

76e662e7786bf88946bd6c010c03ac65

We Have to Find Ways to Reinforce Trust

March 29, 2014 Added by:Jarno Limnéll

We are losing the battle for cyberspace. Not because malicious actors are taking over the digital world, but because we are forgetting what is the element that makes us feel safe and secure in any world: the ability to trust.

Comments  (0)

52a995fead03e1d828980d4b3efd2719

BYOD For Government?

March 23, 2014 Added by:Cam Roberson

BYOD is fast becoming the norm for many enterprises, despite the security risks. Government agencies have been slower to adopt, but will need to start implementing policies that address BYOD.

Comments  (1)

21d6c9b1539821f5afbd3d8ce5d96380

PerspecSys Survey Reveals Cloud-based Security Concerns for 2014

March 10, 2014 Added by:Kevin L. Jackson

After polling 130 security professionals on the show floor of the RSA Conference, PerspecSys found that "an overwhelming 74 percent believe security for cloud-based data in 2014 will be a bigger concern than securing data on-premise."

Comments  (0)

21d6c9b1539821f5afbd3d8ce5d96380

NCOIC Debuts Roadmap for Designing, Managing Cyber-secure Hybrid Computing Environment

March 05, 2014 Added by:Kevin L. Jackson

Known as the NCOIC Rapid Response Capability (NRRC™), the process defines how to build a federated cloud infrastructure that provides a foundation for information sharing within a secure environment

Comments  (0)

65c1700fde3e9a94cc060a7e3777287c

Zero Trust and the Age of Global Connectivity

February 27, 2014 Added by:Simon Moffatt

The internal 'trusted' network no longer exists. Employees often pose the biggest threat to information assets, even though they are trusted with legitimate accounts on protected internal machines. Zero Trust is a recent security approach that looks to move away from network segmentation and focus more on data and resources and who can access them, when and from where.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Surveillance and Pressure Against WikiLeaks and Its Readers

February 19, 2014 Added by:Electronic Frontier Foundation

Surveillance and legal tactics by the NSA and GCHQ add to the growing list of examples of the government responding to investigative journalism that exposes corruption by attacking the media rather than the corruption.

Comments  (0)

21d6c9b1539821f5afbd3d8ce5d96380

Interoperability: A Much Needed Cloud Computing Focus

February 10, 2014 Added by:Kevin L. Jackson

Cloud computing transitions IT from being "systems of physically integrated hardware and software" to "systems of virtually integrated services." This transition makes interoperability the difference between the success and failure of IT deployments, especially in the Federal government.

Comments  (12)

Page « < 2 - 3 - 4 - 5 - 6 > »