Welcome!


Latest Articles from Cloud Security
Believe it or not, the first data backups were made on paper. Dating back as early as the 18th century, the "technology" was used in the form of paper tapes constructed from punch cards to control the functions of automated machinery such as textile looms. The concept of these cards wa...
A key and wide-ranging tech trend that’s affecting enterprises and consumers alike is the Internet of Things (IoT). It’s a development that’s already transforming how we work and live as entrepreneurial minds continue to create use cases for billions of connected things. Transformati...
TCP/IP connectivity starts with a DNS look-up so that Endpoint A, seeking to establish a connection to Endpoint B, can determine B’s IP address. Not knowing when a connection request may be coming, Endpoint B has to continually listen for the arrival of such requests. Not even knowing ...
Deming, the patron saint of DevOps once advised, "It is not necessary to change. Survival is not mandatory." To survive, application development teams are constantly pressured to deliver software even faster. But fast is not enough. The best organizations realize that security, qual...
I was a guest on Scriptrock's podcast series. We discussed cloud security and DevOps. We even talked about my all time favorite album.
DevOps bridges the gap between Development and Operations to accelerate software delivery and increase business agility and time-to-market. With its roots in the Agile movement, DevOps fosters collaboration between teams and streamlines processes, with the goal of breaking silos in ord...
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keepe...
The cloud competition for database hosts is fierce. How do you evaluate a cloud provider for your database platform? In his session at 18th Cloud Expo, Chris Presley, a Solutions Architect at Pythian, will give users a checklist of considerations when choosing a provider. Chris Pres...
I sat down with Michael Rösch, COO of POOL4TOOL, to chat about cloud computing. With a lot of buzz about the impact of the cloud on business, it was a chance to get a perspective, as well as a few hints and tips, from someone who has been at the coalface of procurement cloud services f...
The Federal Government’s “Cloud First” policy mandates that agencies take full advantage of cloud computing benefits to maximize capacity utilization, improve IT flexibility and responsiveness, and minimize cost. The Federal Risk and Authorization Management Program (FedRAMP) is a mand...
The evolution of cybersecurity as it relates to healthcare in the United States is by most standards in its infancy, but this situation is changing quickly. The industry is scrambling to shore up defenses as cyberattacks and breaches increase. Very few people, if asked twenty years a...
Recognizing the need to identify and validate information security professionals’ competency in securing cloud services, the two leading membership organizations focused on cloud and information security, the Cloud Security Alliance (CSA) and (ISC)^2, joined together to develop an inte...
Digital transformation has increased the speed at which organizations must adapt. As they do so, it’s more important than ever to be able to choose solutions that will give them a comprehensive, real-time view of the network. Several factors contribute to this new priority: Root cause...
Hello Barbie™! is an IoT-enabled (Internet of Things) Barbie Doll with blonde hair, blue eyes and a built-in surveillance system. She’s not the first of her kind (and she won’t be the last), but here’s what you should know about bringing it, or any connected device, into your home. Ev...
Everyone is talking about the Cloud, whether on the news or in advertisements from top-tier tech companies, such as Microsoft, Google, and Apple. More important, the small and medium business (SMB) community has embraced the Cloud. Specifically, more than half of SMBs in the US current...
In the ESG Research Report, “2015 IT Spending Intentions Survey,” IT professionals list improving backup and recovery, managing data growth and using cloud infrastructure services as top IT priorities over the next 12 months. So it is no surprise that cloud-based disaster recovery (DR)...
Shot this late last year for Information Security Buzz. What are five information security new year’s resolutions for improving cyber security in 2016 and why?
Clearly the way forward is to move to cloud be it bare metal, VMs or containers. One aspect of the current public clouds that is slowing this cloud migration is cloud lock-in. Every cloud vendor is trying to make it very difficult to move out once a customer has chosen their cloud. In...
The traditional, on-premise computing model has established processes, accreditations, certifications, governance and compliance rules - FISMA, NERC CIP, HIPAA, PCI-DSS, IRS 1075. While the security industry is aggressively addressing the technical security gaps in cloud-driven service...
Everything will be on the cloud. It almost sounds like overstatement even in 2016 doesn’t it? Could we really get ourselves to the point where we regard the cloud layer as our first, primary, default and de facto location for data? The answer is: yes, we do already… although perhaps n...
"Security starts very simply at home when you're on your PC. At DataClear we thought 'How do we make a secure desktop for people and for corporations,'" explained Tony Teora, CEO of DataClear, in this SYS-CON.tv interview at 17th Cloud Expo, held November 3-5, 2015, at the Santa Clara ...
Enterprises can achieve rigorous IT security as well as improved DevOps practices and Cloud economics by taking a new, cloud-native approach to application delivery. Because the attack surface for cloud applications is dramatically different than for highly controlled data centers, a d...
"Open source is a very powerful thing and lies at the heart of most modern technology. It's useful to a lot of people and a lot of companies invest in it," stated Alex Gorbachev, President of Intelligent Systems Services Inc., in this SYS-CON.tv interview at 17th Cloud Expo, held Novem...
The rise of cloud-based infrastructure was one of the biggest developments in IT during the past few years, and now we are seeing extensive innovations in cloud security as well. More companies are moving their business-critical data away from onsite data centers and into cloud-based i...
You’ve likely experienced alert fatigue at some point in your life. You feel exasperated as your phone pings for what seems like the hundredth time in a day, or your eyes glaze over as a glut of new analytics data rolls in. You feel resigned to the fact that an influx of email could ve...
It’s a given that employee access to corporate systems should be both as secure and simple as possible. However, time-strapped CIOs under pressure from demanding staff and challenged with authenticating users all over the world on multiple devices, have been torn between relying on the...
"We announced CryptoScript, it's a new way of programming a hardware security module, which technically requires standard APIs and very specific knowledge. With CryptoScript we hope to change that a bit," explained Johannes Lintzen, Vice President of Sales at Utimaco, in this SYS-CON.t...
"eFolder does a lot of different things but we protect data and we are focused on protecting data no matter where it resides," explained Carlo Tapia, Product Marketing Manager at eFolder, in this SYS-CON.tv interview at Cloud Expo, held November 3-5, 2015, at the Santa Clara Convention...
The revocation of Safe Harbor has radically affected data sovereignty strategy in the cloud. In his session at 17th Cloud Expo, Jeff Miller, Product Management at Cavirin Systems, discussed how to assess these changes across your own cloud strategy, and how you can mitigate risks pre...
Naturally, new and exciting technologies and trends like software defined networking, the Internet of Things and the cloud tend to get the lion’s share of attention these days, including when it comes to security. However, it’s important to never forget that at the center of it all is ...
Based on a concept of centralized data analysts, traditional BI creates a system where IT specialists create deep-dive reports, typically for C-suite executives because analysts’ time is too valuable to spread any thinner. Imagine that you wanted to see a review of the latest weekend ...
In recent years, at least 40% of companies using cloud applications have experienced data loss. One of the best prevention against cloud data loss is backing up your cloud data. In his General Session at 17th Cloud Expo, Sam McIntyre, Partner Enablement Specialist at eFolder, present...
In demand-intensive mobile and web applications, an emerging pattern is to host the Systems of Engagement in the cloud (for maximum responsiveness) but keep the Systems of Record with the other important business systems in the company datacenter, often on a tightly secured mainframe. ...
Today, most enterprises have some type of cloud-based solutions or are looking at cloud-based infrastructure for some of their enterprise applications. What is lacking in many organizations is the strategic design focus and sophisticated implementation for very secure infrastructure wh...
Cybersecurity and the security of the data in the cloud is a hot topic. The number of companies hacked and the magnitude of losses have been growing at an alarming rate. Earlier this year, an international hacking ring stole as much as $1 billion from over 100 banks in 30 countries in ...
The tech industry has been abuzz about the potential of the Internet of Things for the past several years, and with good reason. As more devices become connected to one another, society steps even closer to the ultimate goal of an overarching, cohesive network facilitating communicatio...
The Internet of Things is here. In the coming years, billions of devices like sensors, meters or actuators will be connected to the network, sharing information and taking instructions. These connected devices will sense and deliver more data, respond to control inputs and provide more...
Developers generally like to share their code, and many of them do so by open sourcing it on GitHub, a social code hosting and collaboration service. Many companies also use GitHub as a convenient place to host both private and public code repositories by creating GitHub organizations ...
The cloud. Like a comic book superhero, there seems to be no problem it can’t fix or cost it can’t slash. Yet making the transition is not always easy and production environments are still largely on premise. Taking some practical and sensible steps to reduce risk can also help provide...
Regardless of perspective, everyone agrees that ensuring high-quality software isn’t solely the job of a “QA department.” It requires the collaboration of every discipline in the software development and delivery lifecycle from the inception of business requirements to the administrati...