Welcome!


Latest Articles from Cloud Security
In the middle of World War II, very basic and primitive computers were designed to improve accuracy for naval gunfire. The first computers ran complex mathematical applications to calculate trajectories and gunfire from large battleships. The size of the computer was huge and was made ...
Recognizing the need to identify and validate information security professionals’ competency in securing cloud services, the two leading membership organizations focused on cloud and information security, the Cloud Security Alliance (CSA) and (ISC)^2, joined together to develop an inte...
SYS-CON Events announced today that (ISC)²® (“ISC-squared”) will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Two leading non-profits focused on cloud and information security, (ISC)² and Cloud...
The Federal Government’s “Cloud First” policy mandates that agencies take full advantage of cloud computing benefits to maximize capacity utilization, improve IT flexibility and responsiveness, and minimize cost. The Federal Risk and Authorization Management Program (FedRAMP) is a mand...
Digital transformation has increased the speed at which organizations must adapt. As they do so, it’s more important than ever to be able to choose solutions that will give them a comprehensive, real-time view of the network. Several factors contribute to this new priority: Root cause...
Hello Barbie™! is an IoT-enabled (Internet of Things) Barbie Doll with blonde hair, blue eyes and a built-in surveillance system. She’s not the first of her kind (and she won’t be the last), but here’s what you should know about bringing it, or any connected device, into your home. Ev...
Everyone is talking about the Cloud, whether on the news or in advertisements from top-tier tech companies, such as Microsoft, Google, and Apple. More important, the small and medium business (SMB) community has embraced the Cloud. Specifically, more than half of SMBs in the US current...
In the ESG Research Report, “2015 IT Spending Intentions Survey,” IT professionals list improving backup and recovery, managing data growth and using cloud infrastructure services as top IT priorities over the next 12 months. So it is no surprise that cloud-based disaster recovery (DR)...
Shot this late last year for Information Security Buzz. What are five information security new year’s resolutions for improving cyber security in 2016 and why?
Clearly the way forward is to move to cloud be it bare metal, VMs or containers. One aspect of the current public clouds that is slowing this cloud migration is cloud lock-in. Every cloud vendor is trying to make it very difficult to move out once a customer has chosen their cloud. In...
The traditional, on-premise computing model has established processes, accreditations, certifications, governance and compliance rules - FISMA, NERC CIP, HIPAA, PCI-DSS, IRS 1075. While the security industry is aggressively addressing the technical security gaps in cloud-driven service...
Everything will be on the cloud. It almost sounds like overstatement even in 2016 doesn’t it? Could we really get ourselves to the point where we regard the cloud layer as our first, primary, default and de facto location for data? The answer is: yes, we do already… although perhaps n...
"Security starts very simply at home when you're on your PC. At DataClear we thought 'How do we make a secure desktop for people and for corporations,'" explained Tony Teora, CEO of DataClear, in this SYS-CON.tv interview at 17th Cloud Expo, held November 3-5, 2015, at the Santa Clara ...
Enterprises can achieve rigorous IT security as well as improved DevOps practices and Cloud economics by taking a new, cloud-native approach to application delivery. Because the attack surface for cloud applications is dramatically different than for highly controlled data centers, a d...
"Open source is a very powerful thing and lies at the heart of most modern technology. It's useful to a lot of people and a lot of companies invest in it," stated Alex Gorbachev, President of Intelligent Systems Services Inc., in this SYS-CON.tv interview at 17th Cloud Expo, held Novem...
The rise of cloud-based infrastructure was one of the biggest developments in IT during the past few years, and now we are seeing extensive innovations in cloud security as well. More companies are moving their business-critical data away from onsite data centers and into cloud-based i...
You’ve likely experienced alert fatigue at some point in your life. You feel exasperated as your phone pings for what seems like the hundredth time in a day, or your eyes glaze over as a glut of new analytics data rolls in. You feel resigned to the fact that an influx of email could ve...
It’s a given that employee access to corporate systems should be both as secure and simple as possible. However, time-strapped CIOs under pressure from demanding staff and challenged with authenticating users all over the world on multiple devices, have been torn between relying on the...
"We announced CryptoScript, it's a new way of programming a hardware security module, which technically requires standard APIs and very specific knowledge. With CryptoScript we hope to change that a bit," explained Johannes Lintzen, Vice President of Sales at Utimaco, in this SYS-CON.t...
"eFolder does a lot of different things but we protect data and we are focused on protecting data no matter where it resides," explained Carlo Tapia, Product Marketing Manager at eFolder, in this SYS-CON.tv interview at Cloud Expo, held November 3-5, 2015, at the Santa Clara Convention...
The revocation of Safe Harbor has radically affected data sovereignty strategy in the cloud. In his session at 17th Cloud Expo, Jeff Miller, Product Management at Cavirin Systems, discussed how to assess these changes across your own cloud strategy, and how you can mitigate risks pre...
Naturally, new and exciting technologies and trends like software defined networking, the Internet of Things and the cloud tend to get the lion’s share of attention these days, including when it comes to security. However, it’s important to never forget that at the center of it all is ...
Based on a concept of centralized data analysts, traditional BI creates a system where IT specialists create deep-dive reports, typically for C-suite executives because analysts’ time is too valuable to spread any thinner. Imagine that you wanted to see a review of the latest weekend ...
In recent years, at least 40% of companies using cloud applications have experienced data loss. One of the best prevention against cloud data loss is backing up your cloud data. In his General Session at 17th Cloud Expo, Sam McIntyre, Partner Enablement Specialist at eFolder, present...
In demand-intensive mobile and web applications, an emerging pattern is to host the Systems of Engagement in the cloud (for maximum responsiveness) but keep the Systems of Record with the other important business systems in the company datacenter, often on a tightly secured mainframe. ...
Today, most enterprises have some type of cloud-based solutions or are looking at cloud-based infrastructure for some of their enterprise applications. What is lacking in many organizations is the strategic design focus and sophisticated implementation for very secure infrastructure wh...
Cybersecurity and the security of the data in the cloud is a hot topic. The number of companies hacked and the magnitude of losses have been growing at an alarming rate. Earlier this year, an international hacking ring stole as much as $1 billion from over 100 banks in 30 countries in ...
The tech industry has been abuzz about the potential of the Internet of Things for the past several years, and with good reason. As more devices become connected to one another, society steps even closer to the ultimate goal of an overarching, cohesive network facilitating communicatio...
The Internet of Things is here. In the coming years, billions of devices like sensors, meters or actuators will be connected to the network, sharing information and taking instructions. These connected devices will sense and deliver more data, respond to control inputs and provide more...
Developers generally like to share their code, and many of them do so by open sourcing it on GitHub, a social code hosting and collaboration service. Many companies also use GitHub as a convenient place to host both private and public code repositories by creating GitHub organizations ...
The cloud. Like a comic book superhero, there seems to be no problem it can’t fix or cost it can’t slash. Yet making the transition is not always easy and production environments are still largely on premise. Taking some practical and sensible steps to reduce risk can also help provide...
Regardless of perspective, everyone agrees that ensuring high-quality software isn’t solely the job of a “QA department.” It requires the collaboration of every discipline in the software development and delivery lifecycle from the inception of business requirements to the administrati...
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across priv...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always lo...
The pervasiveness of software is driving the dynamics of business transactions everywhere. We live in a time of a highly competitive and truly global economy where the question being answered among businesses now is “who can innovate the fastest?” To keep pace with the increasing velo...
My father used to tell me that the key to success in life was to look people in the eye and give them a firm handshake. But the art of the handshake seems to have died in my generation. I grew up in the era of high fives, forearm smashes and fist pumps. I played baseball, so there were...
This is how a typical software product lifecycle works : You gather requirements, build a prototype, detail out the architecture and design, develop the product, test it, deploy the product, handle migration and maintenance and ensure product support. This is a closed loop where the Pr...
Do you have a plan in place if your business were to meet with disaster? Would your business be able to operate or would it be out of operation for the unforeseeable future? Luckily today, technology makes it possible to mitigate the damages that a disaster can cause to a business. The...
Cloud computing delivers on-demand IT resources that provide businesses flexibility. The challenge is the cost and complexity of cloud security compliance (PCI, HIPAA, FFIEC). Raxak Protect automated cloud security enables cloud apps to be deployed quickly and cost-effectively. Get the...
No, this isn't a tirade on the security of IoT. It's about story about change. Specifically, change and its implications on security. Change is constant. There's a million different axioms and proverbs about change, so it's really hard to choose just one to sum up how it impacts sec...