By Ed Featherston  I was recently on a business trip out to Wausau, WI. The purpose was to conduct a training session on web application development for a new batch of associates at our onshore development center. When I picked up my rental car at the airport, I was very happy to discover it had built in... May. 18, 2017 10:00 AM EDT Reads: 10,128 |
By Evelyn de Souza  Cloud has become an extension of today’s enterprise and the traditional perimeter has long disappeared. Increasing business requirements for agility and flexibility make the cloud-extended enterprise ideal for a workforce that works anywhere, anytime and any place. This is especially t... Dec. 29, 2015 02:00 PM EST Reads: 7,113 |
By John Wetherill  CIOs are increasingly concerned about cloud security. And they should be: with the recent outbreak of visible breaches at high-profile organizations like Target, Anthem, and others, and the subsequent damage they cause, corporations are scrambling to make sure their cloud applications,... May. 24, 2015 02:45 AM EDT Reads: 8,092 |
By Ian Khan  Learn about the current state of security breaches and what it is costing businesses.
One of my recent conversations with a Cloud security expert at a conference opened up doors to some new information for me personally. Our conversation was around the current status of the Cloud Indu... Apr. 5, 2015 04:00 PM EDT Reads: 4,319 |
By Brian Vandegrift  The concept of a cloud facilitating applications is by no means new. Those of us who diagrammed network connectivity around 1993 will recall drawing a big puffy cloud symbol in between two local area networks. The cloud represented the mysterious Internet – that mash-up of routers and ... Apr. 3, 2015 10:00 AM EDT Reads: 3,632 |
By Evelyn de Souza  Recent events have taught us that everyone is vulnerable to data breaches. Now that the majority of businesses are running services in the cloud, whether sanctioned, rogue or Shadow IT, there is much work to be done in beefing up cloud security. And, with each major data breach that ta... Mar. 18, 2015 03:00 PM EDT Reads: 3,539 |
By Adam Simpson  Many businesses are realizing the advantages of moving essential business services to cloud-based models, including communications, voice, and CRM. The associated advantages of the cloud have allowed businesses to be more flexible, scalable and enjoy higher cost savings. However, these... Feb. 27, 2015 03:00 PM EST Reads: 3,797 |
By Derek Collison  2015 is being billed by many in the industry as the “Year of the Hybrid Cloud.” In fact, more than 65 percent of enterprise IT organizations will commit to hybrid cloud technologies before 2016, vastly driving the rate and pace of change in IT organizations, according to IDC FutureScap... Feb. 22, 2015 08:00 PM EST Reads: 4,294 |
By Nicholas Lee  There is no universal global guideline when it comes to how data is managed, secured, and accessed. Privacy laws vary from country to country and are still being defined in the digital age. In the face of trends like consumerization, mobility, and the distributed workplace, data reside... Feb. 14, 2015 02:00 PM EST Reads: 5,273 |
By Liz McMillan  Exploiting weak identity credentials is one of the most common elements of most attacks. Even attacks that seem unrelated to users, such as recent point of sale (POS) attacks at well-known retailers like the ones you have mentioned, can be traced to insecure passwords. Often, the same ... Feb. 5, 2015 01:30 PM EST Reads: 7,052 |
By Rich Campagna  The shift to the cloud is in full swing. More and more organizations are adopting Software-as-a-Service(SaaS), forcing IT organizations to develop new strategies to secure the onslaught of data created and stored in cloud applications. Failure to develop strategies to close security g... Jan. 11, 2015 02:00 PM EST Reads: 4,103 |
By Gilad Parann-Nissany  Cloud computing is your future operational platform, (virtual) data center, and application platform – all rolled into one concept from multiple vendors. The following are 25 recent statistics about the current and future state of the cloud that will help you understand the breadth of ... Dec. 3, 2014 04:01 PM EST Reads: 3,680 |
By Vincent Brasseur  The cloud has made many things simpler by allowing us to achieve economies of scale, eliminating the software installation process and enabling access of information from virtually anywhere. The list of benefits goes on, but contrary to popular belief, moving to the cloud will not make... Nov. 25, 2014 10:00 PM EST Reads: 4,844 |
By John Grady  Depending on whom you listen to, the private cloud is either dead or on the cusp of a major market breakthrough. Some tech pundits argue this technology has already been replaced by more efficient public cloud offerings and businesses just need time to catch up, while others claim ther... Nov. 24, 2014 10:00 PM EST Reads: 7,222 |
By Colin Lacey  Over the last decade, cloud computing has undeniably become a critical component of the modern enterprise. It has evolved past Software-as-a-Service for a select number of enterprise applications to encompassing entire business platforms, spanning various business devices and operating... Nov. 24, 2014 07:00 PM EST Reads: 6,816 |
By Rick Delgado  Long story short, remote wipes aren’t a perfect solution. The original intent had some validity, but it also raises too many concerns. Wiping is really only an effective solution in an ideal world. Unfortunately, thieves don’t play by the rules and find ways around our solutions. For t... Nov. 24, 2014 12:15 PM EST Reads: 5,246 |
By Lisa Pope  It’s a clear message being heard across the industry - widespread adoption of cloud applications is only a matter of time. However, the tricky part for many is, how much time do organizations actually have to hold out? And why should they switch?
For starters – the cost savings are cl... Nov. 21, 2014 09:15 PM EST Reads: 5,553 |
By Rick Delgado  Storing data of any kind on the cloud can be a risk, but there are ways to mitigate the risks. With such an abundance of cloud providers, there are plenty of options for you to choose from for security purposes. Finding a vendor that encrypts data in motion as well as data at rest is a... Nov. 18, 2014 07:00 PM EST Reads: 4,755 |
By Paige Leidig  Despite the data privacy protections supposedly conferred by regulations like HIPAA and HITECH, consumers’ confidential health and personal information is still not safe enough. That’s the lesson to be learned from Franklin, TN-based Community Health Systems’ (CHS) August 18 regulatory... Nov. 3, 2014 09:00 AM EST Reads: 7,625 Replies: 1 |
By Gilad Parann-Nissany  The Amazon Web Services public infrastructure cloud is seeing massive adoption, and for good reason. Using AWS arms companies with advanced infrastructure that, in most cases, they could not possibly achieve in their own datacenters. In fact, According to Gartner, AWS has 5 times more ... Nov. 1, 2014 07:00 AM EDT Reads: 5,767 |
By Paul Speciale  Enterprise applications are increasing in complexity, with multi-tier and distributed applications being the new standards for dealing with high-volume, high-scale requirements. In many development environments, the ideal scenario is to enable DevOps teams to manage dev/test environmen... Oct. 24, 2014 07:45 PM EDT Reads: 13,739 |
By Ed Featherston  Target. Home Depot. Community Health Systems. Nieman Marcus. Their names have been all in the news over the past year, though probably not in a way they would like. All have had very public data breaches affecting anywhere from 350,000 (Nieman Marcus) to 4.5 million (Community Health S... Oct. 16, 2014 02:30 PM EDT Reads: 6,992 |
By Jay Smith  Content Delivery Networks (CDNs) are a traditional mechanism for both improving the delivery speed of a web site while also reducing the network load on the origin servers that provide the web site. The CDN accomplishes these two goals by offloading static content from the origin web s... Sep. 27, 2014 03:00 PM EDT Reads: 5,476 |
By Fredrik Schmidt  It’s an oft-cited FEMA statistic that 40 percent of small businesses never reopen after a disaster. Almost certainly contributing to this eye-popping failure rate is the fact that an estimated 74 percent of small to mid-sized businesses (SMBs) lack a disaster recovery plan, while 84 pe... Sep. 4, 2014 01:00 PM EDT Reads: 5,499 |
By Sebastian Stadil  In 2012, an IDG survey of enterprise cloud computing adoption showed that 70 percent of respondents said security was among their top three concerns, and two years later, not much has changed. The Everest Group Enterprise Cloud Adoption Survey released in March of 2014 shows that 70 pe... Sep. 3, 2014 12:00 PM EDT Reads: 5,843 |
By Raja Patel  The cloud plays an integral role in enabling the agility required to take advantage of new business models and to do so in a very convenient and cost-effective way. However, this also means that more personal information and business data will exist in the cloud and be passed back and ... Aug. 28, 2014 01:15 PM EDT Reads: 5,686 |
By John Barco  Over the past few years, enterprises have been moving to the cloud to streamline processes and operations. A study last year by TheInfoPro indicated that there is no sign of cloud investment slowing down – predicting an average growth rate of cloud spending of 36 percent from this year... Aug. 25, 2014 10:00 AM EDT Reads: 10,518 |
By Gilad Parann-Nissany  In a Feb 2014 survey, 94 percent of organizations surveyed reported running applications or experimenting with infrastructure-as-a-service[1]. According to research firm Nasumi, there is over one exabyte currently stored in the cloud. An exabyte is over a billion GB[2]. Considering the... Aug. 17, 2014 11:30 AM EDT Reads: 6,759 |
By Ken Asher  Security professionals are constantly negotiating the tension of balancing ease-of-use with data security. Savvy security professionals know that their users will often choose a less secure technology that makes getting things done easier over a more secure technology that makes gettin... Aug. 16, 2014 04:00 PM EDT Reads: 5,459 |
By Jason Thompson  Encryption is a key element of a complete security strategy. The 2013 Global Encryption Trends Study shows a steady increase in the use of encryption solutions over the past nine years. Thirty-five percent of organizations now have an encryption strategy applied consistently across the... Aug. 1, 2014 11:00 AM EDT Reads: 6,029 |
By Jackie Kahle  It is a mistake to think we can secure APIs using the same methods and technology that we used to secure the conventional, browser-centric web. Andi Mann from CA Technologies recently pointed out that, at every turn, customers are interacting more and more with businesses through appli... Jul. 31, 2014 02:30 PM EDT Reads: 5,700 |
By Richard Moulds  The cloud has hit the mainstream. Businesses in the United States currently spend more than $13 billion on cloud computing and managed hosting services, and Gartner projects that by 2015, end-user spending on cloud services could be more than $180 billion worldwide. It is estimated tha... Jul. 26, 2014 03:00 PM EDT Reads: 5,695 |
By Paige Leidig  If your organization’s got a lot riding on the continued security of its confidential or proprietary data, then you need to stay informed on the threats and how to address them. One of the most worrying threats of late, especially when it comes to cloud data security, is government spy... Jul. 21, 2014 09:00 AM EDT Reads: 5,831 |
By Dana Gardner  How do we blaze a better path to a secure mobile future? How do we make today’s ubiquitous mobile devices as low risk as they are indispensable?
As smartphones have become de rigueur in the global digital economy, users want them to do more work, and businesses want them to be more pr... Jul. 14, 2014 07:45 AM EDT Reads: 7,131 |
By Dana Gardner  As we become more connected online, the old system of site-specific passwords and user identity are no longer equal to the task. We need to find new ways of providing identities and authorization. Jul. 11, 2014 09:00 AM EDT Reads: 7,030 |
By Mike Castañeda  Cloud-based Recovery-as-a-Service (RaaS) is becoming big business. Research and Markets forecasts the global market of RaaS and cloud-based business continuity will reach $5.77 billion by 2018, creating major opportunities for business continuity and risk management specialists alike. ... Jul. 7, 2014 09:30 AM EDT Reads: 7,796 |
By Tommy Petrogiannis  As the number of companies adopting cloud-based solutions continues to increase, security remains top of mind for vendors, companies and their customers. Organizations of all types and sizes are opting for cloud e-signatures for many reasons including speed-to-market, agility and a low... Jul. 7, 2014 08:45 AM EDT Reads: 6,892 |
By David Stott  We’ve written before about some of the high-profile data breaches occurring in recent months – security breaches that cause some to question the safety of the cloud to store and/or process sensitive data. It seems these stories are reported with increased regularity (sometimes delayed,... Jul. 4, 2014 03:00 PM EDT Reads: 6,999 |
By Roger Barga; Avinash Joshi; Pravin Venugopal  This article explores how to detect fraud among online banking customers in real-time by running an ensemble of statistical and machine learning algorithms on a dataset of customer transactions and demographic data. The algorithms, namely Logistic Regression, Self-Organizing Maps and S... Jun. 27, 2014 10:15 AM EDT Reads: 10,306 Replies: 1 |
By Paige Leidig  In many industries, cloud computing is now vital to remaining competitive. The cloud typically offers superior flexibility, scalability, accessibility, and high availability, enabling businesses to grow more agile and responsive. Regulatory compliance concerns often make banks and othe... Jun. 23, 2014 08:45 AM EDT Reads: 9,244 Replies: 2 |