Welcome!


Latest Articles from Cloud Security
Privileged Identity Management (PIM) is the lowest common denominator in today’s most treacherous corporate and governmental security breaches. Or more accurately: Privilege Mismanagement. Sony, Target, Anthem, JP Morgan Chase, the city of San Francisco and many others succumbed to the...
In a series of articles, I am going to share my thoughts on the state of IT infrastructure and how we've arrived with current architecture trends. The topic today is SAN. Storage Area Networking (SAN) is a technology that solved a real problem that existed a couple decades ago. SANs h...
In the business world, it’s hard to throw a rock without hitting a compliance requirement. All must be obeyed, but some call for a high level of control and auditability. Governing bodies are exerting their authority like never before, increasing the number of auditors and handing out ...
As the Big Data marketplace moves closer to a point of mass-maturity, business leaders have begun to take new approaches to implementation and utilization. Advanced analytics solutions have made their way into a range of industries and regions, and companies that successfully align the...
The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Digital Transformation, Microserv...
Although security is one of the most talked about topics in the IT channel today, there’s a widespread lack of education and awareness in the workplace. Small and medium-sized businesses (SMBs) are welcoming more technology into their everyday environment, but the rapid development of ...
More than 95 percent of the world’s enterprises rely on SSH user keys to provide administrators and developers an effective means of gaining encrypted access to critical infrastructure: operating systems, applications, payment processing systems, databases, human resource and financial...
A data breach could happen to anyone. Data managed by your company is valuable to someone, no matter what the data is. Everything has a price tag on the dark web. It is especially true when it is customer data, such as personal and payment card details. When your customers’ data turns...
Most organizations prioritize data security only after their data has already been compromised. Proactive prevention is important, but how can you accomplish that on a small budget? Learn how the cloud, combined with a defense and in-depth approach, creates efficiencies by transferring...
The next BriefingsDirect security market transformation discussion explores how airline Allegiant Air solved its payment card industry (PCI) problem -- and got a whole lot better security culture to boot. When Allegiant needed to quickly manage its compliance around the Payment Card I...
Recently, I attended Cloud Expo and @ThingsExpo in NYC (June 7-9) and I found the content to be interesting and thoughtful for companies that are planning their future success. Like most conferences, there was a lot of chatter about IoT app development, consumer trends, and security w...
One of the greatest challenges facing business and government organizations is how to store and move sensitive data around the world while maintaining security. Storing and securing critical data held within data centers (whether physical or virtual) is top of mind from the boardroom t...
Insider threats are on the rise more than ever. It’s a malicious activity that originates from users within an organization, as opposed to attacks like DDoS that come from the outside. Cyber hackers of this kind get inside the system to steal intellectual property from the company via ...
"SpeedyCloud's specialty lies in providing cloud services - we provide IaaS for Internet and enterprises companies," explained Hao Yu, CEO and co-founder of SpeedyCloud, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Security is one of the most controversial topics in the software industry. How do you measure security? Is your favorite software fundamentally insecure? Are Docker containers secure? Dan Walsh, SELinux architect, wrote: "Some people make the mistake of thinking of containers as a bet...
Organizations are experiencing a new emphasis when it comes to cybersecurity. They are moving from securing the perimeter to securing the data within it, which is the result of the proliferation of connected devices in organizations today: smartphones, tablets and the IoT. Organization...
Cloud servers bring with them distributed hosting and the ability to anonymize identities and that has enabled cloud becoming a breeding ground for criminals and even terrorists. The cloud brings unique advantages to individual and business users alike and this explains the exponenti...
Hosting providers are often judged by their ability to ensure network availability/uptime. Unfortunately, distributed denial of service (DDoS) easily impact service availability and, in some instances, completely take down a hosting platform. As DDoS attacks continue to increase in siz...
Software components that were once good can sour instantly when new vulnerabilities are discovered within them. When that happens, the bears are coming, and you have to respond quickly. Two men are walking through a forest. Suddenly, they see a bear off in the distance, running toward...
Humorous metaphor about the cloud aside, this is a not-so-lighthearted blog entry. This is the convergence of progress, loss, and humility. In the fall of 2015, Salesforce.com (SFDC) announced upcoming initiatives for the Internet of Things. What we now know is that it was envisioned ...
SYS-CON Events announced today that Violin Memory®, Inc., will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Violin Memory, the industry pioneer in All Flash Arrays, is the agile innovator, tran...
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across priv...
SYS-CON Events announced today that Fusion, a leading provider of cloud services, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Fusion, a leading provider of integrated cloud solutions to sm...
SYS-CON Events announced today that (ISC)²® (“ISC-squared”) will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Two leading non-profits focused on cloud and information security, (ISC)² and Cloud...
Providing secure, mobile access to sensitive data sets is a critical element in realizing the full potential of cloud computing. However, large data caches remain inaccessible to edge devices for reasons of security, size, format or limited viewing capabilities. Medical imaging, comput...
While many government agencies have embraced the idea of employing cloud computing as a tool for increasing the efficiency and flexibility of IT, many still struggle with large scale adoption. The challenge is mainly attributed to the federated structure of these agencies as well as th...
Enterprise networks are complex. Moreover, they were designed and deployed to meet a specific set of business requirements at a specific point in time. But, the adoption of cloud services, new business applications and intensifying security policies, among other factors, require IT org...
As cloud and storage projections continue to rise, the number of organizations moving to the cloud is escalating and it is clear cloud storage is here to stay. However, is it secure? Data is the lifeblood for government entities, countries, cloud service providers and enterprises ali...
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and t...
SYS-CON Events announced today that Solinea, provider of open infrastructure solutions for deployment and adoption of production clouds, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Soline...
In his session at 18th Cloud Expo, Andrew Cole, Director of Solutions Engineering at Peak 10, will discuss how the newest technology advances are reducing the cost and complexity of traditional business continuity and disaster recovery solutions. Attendees will: Learn why having a f...
The demand for organizations to expand their infrastructure to multiple IT environments like the cloud, on-premise, mobile, bring your own device (BYOD) and the Internet of Things (IoT) continues to grow. As this hybrid infrastructure increases, the challenge to monitor the security of...
Cloud Object Storage is effectively infinitely scalable and boasts the lowest total costs. But cloud SLAs and T&Cs are traditionally optimized for huge customers like Netflix, so applications demanding better confidentiality or higher availability typically can’t reap the benefits of p...
The EMV liability shift that began in October 2015 is likely to reduce card present payment card fraud. That’s a double-edged sword for retailers with an online presence and those who accept mobile payments, as fraudsters are seeking easier routes to ill-gotten gain. Add to this the on...
Wow, if you ever wanted to learn about Rugged DevOps (some call it DevSecOps), sit down for a spell with Shannon Lietz, Ian Allison and Scott Kennedy from Intuit. We discussed a number of important topics including internal war games, culture hacking, gamification of Rugged DevOps and ...
In his session at 18th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., will focus on real world deployments of DDoS mitigation strategies in every layer of the network. He will give an overview of methods to prevent these attacks and best practices...
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industr...
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways t...
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can effici...
Most people love new technology. It can make us more productive. It can lower our costs. It can be very “cool.” So, if it’s true and most people love new technology, why do we tend to adopt new technology on a “curve?” Why do innovators and early adopters jump in early while others bec...