Welcome!


Latest Articles from Cloud Security
Initially, we came across ransomware which exploited the entire system and just restricted you from interacting with your own device, later on requiring you to pay dollars if you want to go back and use your computer. And then it started becoming obsolete because an end-user. People...
Most people love new technology. It can make us more productive. It can lower our costs. It can be very “cool.” So, if it’s true and most people love new technology, why do we tend to adopt new technology on a “curve?” Why do innovators and early adopters jump in early while others bec...
According to a study the rising number of cloud-specific security attacks are likely to propel the demand for cloud security systems to 20 percent CAGR over the next four years. Adoption of cloud computing services has risen and so have the security risks associated with them. Accordi...
It is a sad but very real truth that many, dare I say most, IT professionals consider alerts to be the bane of their existence. After all, they’re annoying, noisy, mostly useless and frequently false. Thus, we IT professionals who specialize in IT monitoring are likely well acquainted ...
The EMV liability shift that began in October 2015 is likely to reduce card present payment card fraud. That’s a double-edged sword for retailers with an online presence and those who accept mobile payments, as fraudsters are seeking easier routes to ill-gotten gain. Add to this the on...
SYS-CON Events announced today that Fusion, a leading provider of cloud services, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Fusion, a leading provider of integrated cloud solutions to sm...
Wow, if you ever wanted to learn about Rugged DevOps (some call it DevSecOps), sit down for a spell with Shannon Lietz, Ian Allison and Scott Kennedy from Intuit. We discussed a number of important topics including internal war games, culture hacking, gamification of Rugged DevOps and ...
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can effici...
Currently, the preferred method of data protection of cloud giants, such as Google, is to replicate the data across different locations (i.e., data centers), rather than performing a true back up. This is done because a true back up seems logistically too complicated given the amount o...
SYS-CON Events announced today that (ISC)²® (“ISC-squared”) will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Two leading non-profits focused on cloud and information security, (ISC)² and Cloud...
SYS-CON Events announced today that Interoute, owner-operator of one of Europe's largest networks and a global cloud services platform, has been named “Bronze Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016 at the Javits Center in New York, New York. Int...
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and t...
As devices, sensors, objects and people are given digital identities that connect them to the Internet by the billions, the need for security and privacy becomes a critical factor for both market adoption and safety. The 40-year-old security methods we now use on our PCs and networks c...
Basho Technologies has announced that Innometrics has adopted its Riak KV database to power its Profile Cloud API. Innometrics is a pioneering start-up that enables brands to bring together data about their customers' behaviour across multiple channels and power more intelligent marke...
SYS-CON Events announced today CyberTrend has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, a...
Fail fast, fail often. Yeah, but the first failure blew up the satellite. Well, this is just a photo-sharing app..not rocket science. Okay, but your photos are accessed by users who have passwords that they probably use for other things..and aren't some photos as important as satellite...
Dell SecureWorks is launching Advanced Endpoint Threat Detection (AETD) Red CloakTM, a fully-managed SaaS solution that can slash the time required to detect and respond to cyber-attacks from months or weeks to hours or minutes. Armed with strong threat detection and endpoint monitori...
In the middle of World War II, very basic and primitive computers were designed to improve accuracy for naval gunfire. The first computers ran complex mathematical applications to calculate trajectories and gunfire from large battleships. The size of the computer was huge and was made ...
Symantec Corp. has announced the worldwide availability of Encryption Everywhere, a website security package available through web hosting providers. Encryption Everywhere lets web hosting providers integrate encryption into every website from the moment it is created. With the new web...
Akamai Technologies has opened a new, state-of-the-art data center in Sydney, Australia, as part of its global expansion strategy. Fueled by the increasing sophistication of distributed denial of service (DDoS) attacks, the company’s latest ‘scrubbing center’ leverages a cloud-based ap...
Cryptzone has announced version 2.0 of AppGate XDP, Cryptzone’s dynamic, secure access control platform that dramatically reduces the attack surface for all users across applications and data hosted both on-premises and in the cloud. Traditional security tools like VPNs, firewalls, an...
451 Research recently published its 2016 Enterprise Storage Outlook in which both Amazon Web Services (AWS) and Microsoft become top 5 enterprise storage vendors by 2017. Further, AWS surges from 6th place to 2nd place while NetApp plummets from 2nd place to 6th place. Spending on publ...
Coalfire has joined the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. Coalfire has extensive experience advising and assessing cloud services providers,...
Many organizations today require 24x7 access to the data they need to run their operations. According to a recent survey, when IT teams modernize their data centers, high-speed recovery and data loss avoidance are the two most sought-after capabilities. Eliminating any “availability ga...
Cloud applications are well established for many activities such as CRM, HR, and billing. With the cloud paradigm proven for so many enterprise tasks, the question of cloud vs. on-premises seems like yesterday’s – or even last year’s – debate. But is the cloud ready to handle the uniqu...
Believe it or not, the first data backups were made on paper. Dating back as early as the 18th century, the "technology" was used in the form of paper tapes constructed from punch cards to control the functions of automated machinery such as textile looms. The concept of these cards wa...
A key and wide-ranging tech trend that’s affecting enterprises and consumers alike is the Internet of Things (IoT). It’s a development that’s already transforming how we work and live as entrepreneurial minds continue to create use cases for billions of connected things. Transformati...
TCP/IP connectivity starts with a DNS look-up so that Endpoint A, seeking to establish a connection to Endpoint B, can determine B’s IP address. Not knowing when a connection request may be coming, Endpoint B has to continually listen for the arrival of such requests. Not even knowing ...
Deming, the patron saint of DevOps once advised, "It is not necessary to change. Survival is not mandatory." To survive, application development teams are constantly pressured to deliver software even faster. But fast is not enough. The best organizations realize that security, qual...
I was a guest on Scriptrock's podcast series. We discussed cloud security and DevOps. We even talked about my all time favorite album.
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always lo...
DevOps bridges the gap between Development and Operations to accelerate software delivery and increase business agility and time-to-market. With its roots in the Agile movement, DevOps fosters collaboration between teams and streamlines processes, with the goal of breaking silos in ord...
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keepe...
The cloud competition for database hosts is fierce. How do you evaluate a cloud provider for your database platform? In his session at 18th Cloud Expo, Chris Presley, a Solutions Architect at Pythian, will give users a checklist of considerations when choosing a provider. Chris Pres...
I sat down with Michael Rösch, COO of POOL4TOOL, to chat about cloud computing. With a lot of buzz about the impact of the cloud on business, it was a chance to get a perspective, as well as a few hints and tips, from someone who has been at the coalface of procurement cloud services f...
The Federal Government’s “Cloud First” policy mandates that agencies take full advantage of cloud computing benefits to maximize capacity utilization, improve IT flexibility and responsiveness, and minimize cost. The Federal Risk and Authorization Management Program (FedRAMP) is a mand...
The evolution of cybersecurity as it relates to healthcare in the United States is by most standards in its infancy, but this situation is changing quickly. The industry is scrambling to shore up defenses as cyberattacks and breaches increase. Very few people, if asked twenty years a...
Recognizing the need to identify and validate information security professionals’ competency in securing cloud services, the two leading membership organizations focused on cloud and information security, the Cloud Security Alliance (CSA) and (ISC)^2, joined together to develop an inte...
Digital transformation has increased the speed at which organizations must adapt. As they do so, it’s more important than ever to be able to choose solutions that will give them a comprehensive, real-time view of the network. Several factors contribute to this new priority: Root cause...
Hello Barbie™! is an IoT-enabled (Internet of Things) Barbie Doll with blonde hair, blue eyes and a built-in surveillance system. She’s not the first of her kind (and she won’t be the last), but here’s what you should know about bringing it, or any connected device, into your home. Ev...