Welcome!


Security & Cloud Computing

The cloud has hit the mainstream. Businesses in the United States currently spend more than $13 billion on cloud computing and managed hosting services, and Gartner projects that by 2015, end-user spending on cloud services could be more than $180 billion worldwide. It is estimated tha...
If your organization’s got a lot riding on the continued security of its confidential or proprietary data, then you need to stay informed on the threats and how to address them. One of the most worrying threats of late, especially when it comes to cloud data security, is government spy...
How do we blaze a better path to a secure mobile future? How do we make today’s ubiquitous mobile devices as low risk as they are indispensable? As smartphones have become de rigueur in the global digital economy, users want them to do more work, and businesses want them to be more pr...
As we become more connected online, the old system of site-specific passwords and user identity are no longer equal to the task. We need to find new ways of providing identities and authorization.
Cloud-based Recovery-as-a-Service (RaaS) is becoming big business. Research and Markets forecasts the global market of RaaS and cloud-based business continuity will reach $5.77 billion by 2018, creating major opportunities for business continuity and risk management specialists alike. ...
As the number of companies adopting cloud-based solutions continues to increase, security remains top of mind for vendors, companies and their customers. Organizations of all types and sizes are opting for cloud e-signatures for many reasons including speed-to-market, agility and a low...
We’ve written before about some of the high-profile data breaches occurring in recent months – security breaches that cause some to question the safety of the cloud to store and/or process sensitive data. It seems these stories are reported with increased regularity (sometimes delayed,...
This article explores how to detect fraud among online banking customers in real-time by running an ensemble of statistical and machine learning algorithms on a dataset of customer transactions and demographic data. The algorithms, namely Logistic Regression, Self-Organizing Maps and S...
In many industries, cloud computing is now vital to remaining competitive. The cloud typically offers superior flexibility, scalability, accessibility, and high availability, enabling businesses to grow more agile and responsive. Regulatory compliance concerns often make banks and othe...
In 2013, the total cost of natural disasters reached $192 billion, according to recent research from Impact Forecasting, a division of reinsurance company Aon Benfield, who conducts these reports each year. In 2012, Hurricane Sandy topped 2013’s most costly natural disaster. With dam...
The private cloud is misunderstood. At this stage, vendors can be forgiven for not having a firm idea of what the private cloud is and how it can uniquely improve their processes. Too many service providers have branded legacy technologies as "cloud-based," warping buyers' expectations...
Last week's Joyent outage brought us thinking how many IT teams make the effort what is the meaningful downtime that will not have significant impact on their business. In this post I will not discuss this particular outage although it is a yet another good example for improving the IT...
We’ve distilled lessons learned from Snowden scandal and created 5 questions every CEO should be asking their CIO / CISO in order to avoid a catastrophic rogue insider event in the private sector both in using cloud as a vector of exfiltration as well as protecting their data stored in...
Lately we have seen a lot of articles discussing how easy Disaster Recovery in the cloud is but very few of those put the emphasis on talking about the basics of Disaster Recovery and educating customers on why they should be thinking about it. There are six myths that needs to be addr...
Until this week the biggest anxiety when dealing with eBay has likely been fretting over a negative rating, concerns about slow shipping or a delayed refund. Then suddenly yesterday the media jumped all over the story that eBay had been hacked and users need to change their passwords. ...
Risk-conscious enterprises across the globe have been reluctant to embrace the public cloud model. For many, compliance requirements are the source of the reluctance. For others, concerns about ceding control of their data to a cloud service provider, without the cloud service provider...
Last month, the Information Security Forum released their annual prediction of the top 10 information security threats they foresee for the next two years – through 2016. While I found the entire list insightful, half of the list resonated strongly with me as someone who is working wit...
To help maintain control and remain ever-ready for improvements, healthcare SaaS application developer PointClickCare recently adopted a cloud-based IT service management solution. Whether it's monitoring medication management in a closed-loop integration with pharmacies, or managing ...
There are two pieces of good news to come out of Heartbleed. First, we haven’t heard of any significant security breaches, which mean that the industry as a whole is getting better at fixing problems as they arise. The second is that, because Heartbleed presented every single cloud pr...
Arlington Computer Products improved their financial processes and operations using the new AribaPay cloud-based B2B payment service. Agile business services are entering into a new era, an integrated and on-demand approach to ordering, billing, and settlement processes between buyers...
One challenge more and more enterprises are grappling with as they plan to adopt the cloud is data residency & sovereignty. They are finding that if they want to use a cloud service hosted outside of their borders, life can become quite complex. Perhaps it is a result of the often disc...
Every company worries about competition. When I ran a large enterprise solutions organization, I took steps every day to ensure we were outpacing the competition. Frequently this involved making “build” vs “buy” decisions for the various product parts or services we needed to drive our...
As recent events have confirmed once again, no single company, organization or government is up to the task of securing the Internet. The never-ending cat and mouse game of exploits chasing vulnerabilities continues. The stunning Heartbleed discovery has shaken the online security esta...
Printing and the cloud are seemingly at opposite ends of an organization’s infrastructure spectrum. Printing remains one of the last bastions of an organization’s infrastructure that cannot be completely virtualized since the whole point of printing is to take something virtual and mak...
Enterprises are moving more and more applications to the cloud. Gartner predicts that the bulk of new IT spending by 2016 will be for cloud computing platforms and applications and that nearly half of large enterprises will have cloud deployments by the end of 2017.1 The far-reaching...
The cloud computing revolution is well underway and there are lots of benefits to be realized. According to Awesome Cloud research the industry will be worth more than $150 billion this year, compared to $46 billion just six years ago. Mirroring the general trend for SaaS solutions, cl...
Cloud computing security can be a conundrum. The point of using the public cloud is to outsource certain infrastructure and application needs to third party providers, after all. How can you secure your data once it leaves your perimeter and your control? As puzzling as it may seem, th...
While Big Data and the cloud are often thought of as going hand in hand, some enterprises still hesitate to place large amounts of proprietary data online. Enterprises decide to keep their large data sets stored locally for a variety of reasons including the possibility of security bre...
There are things we tend to take for granted in our everyday lives. We have certain expectations that don’t even have to be spoken, they’re just a given. If you walk into a room and turn on the light switch, the lights will go on, it’s assumed. If you turn the water faucet on, water wi...
Zetta.net is an enterprise-grade backup and disaster recovery provider. We have been in business for over five years, and we have over 800 enterprise customers and managed service providers (MSPs) that use or resell our product, as is the case with MSPs. In terms of the IT challenges,...
Securing your data comes down to making both physical and virtual changes to your data center. From interior and exterior surveillance systems to software that detects system-level changes across remote and distributed locations, you must make use of any and all available strategies to...
As organizations continue expanding their adoption of the public cloud, many IT and security professionals are beginning to see that they need improved cloud-monitoring and cloud-auditing capabilities. By cloud monitoring, I’m referring to the process of identifying cloud use within an...
The proliferation of cloud-based applications for the enterprise grows each day, and more and more professionals have grown dependent on these apps as the consumerization of IT flourishes in today’s mobile enterprise. With the consumerization of IT, employees have become their own IT e...
Traditional methods of software development went over the waterfall in a barrel and smashed on the rocks below. The Agile Manifesto was written more than a decade ago. Agile adoption has worked wonders for software development. New products leap from concept to market faster than ever ...
Application logs contain a massive repository of events and come in many different formats. They can have valuable information, but gaining useful insight can be difficult without the assistance of machine learning to help reveal critical problems. Transaction logs can contain gigabyt...
Enterprise organizations are looking for service providers to be a trusted partner with them throughout the entire transition through steady state process. The key for cloud providers is to develop ongoing relationships with their customers using hands-on engagement processes from begi...
Businesses have IT because apps deliver value to their customers. This can be direct value - a user-facing app. Or it can be indirect - an internal app for managing sales, marketing, or even HR transactions. Either way, the idea is that the app will make the business more efficient and...
There’s been plenty written and predicted about the future of cloud and Software-as-a-Service, and it’s hard to argue with its benefits – for both organizations and users. If our cloud-based future is to come true though, we must pay closer attention to the service levels users are get...
Virtualized and private cloud infrastructures are all about sharing resources – compute, storage and network. Optimizing these environments comes down to the ability to properly balance capacity supply and application demand. In practical terms, this means allocating the right amount o...
Cloud computing brings a myriad of benefits for any enterprise, but it is also a cause for concern in a world where, according to InformationWeek, cyber criminals are now targeting "any company where they can find data to resell, disrupt or exploit." Moving your company's sensitive da...