Welcome!


Latest Articles from Cloud Security
Naturally, new and exciting technologies and trends like software defined networking, the Internet of Things and the cloud tend to get the lion’s share of attention these days, including when it comes to security. However, it’s important to never forget that at the center of it all is ...
Based on a concept of centralized data analysts, traditional BI creates a system where IT specialists create deep-dive reports, typically for C-suite executives because analysts’ time is too valuable to spread any thinner. Imagine that you wanted to see a review of the latest weekend ...
In recent years, at least 40% of companies using cloud applications have experienced data loss. One of the best prevention against cloud data loss is backing up your cloud data. In his General Session at 17th Cloud Expo, Sam McIntyre, Partner Enablement Specialist at eFolder, present...
In demand-intensive mobile and web applications, an emerging pattern is to host the Systems of Engagement in the cloud (for maximum responsiveness) but keep the Systems of Record with the other important business systems in the company datacenter, often on a tightly secured mainframe. ...
Today, most enterprises have some type of cloud-based solutions or are looking at cloud-based infrastructure for some of their enterprise applications. What is lacking in many organizations is the strategic design focus and sophisticated implementation for very secure infrastructure wh...
Cybersecurity and the security of the data in the cloud is a hot topic. The number of companies hacked and the magnitude of losses have been growing at an alarming rate. Earlier this year, an international hacking ring stole as much as $1 billion from over 100 banks in 30 countries in ...
The tech industry has been abuzz about the potential of the Internet of Things for the past several years, and with good reason. As more devices become connected to one another, society steps even closer to the ultimate goal of an overarching, cohesive network facilitating communicatio...
The Internet of Things is here. In the coming years, billions of devices like sensors, meters or actuators will be connected to the network, sharing information and taking instructions. These connected devices will sense and deliver more data, respond to control inputs and provide more...
Developers generally like to share their code, and many of them do so by open sourcing it on GitHub, a social code hosting and collaboration service. Many companies also use GitHub as a convenient place to host both private and public code repositories by creating GitHub organizations ...
The cloud. Like a comic book superhero, there seems to be no problem it can’t fix or cost it can’t slash. Yet making the transition is not always easy and production environments are still largely on premise. Taking some practical and sensible steps to reduce risk can also help provide...
Regardless of perspective, everyone agrees that ensuring high-quality software isn’t solely the job of a “QA department.” It requires the collaboration of every discipline in the software development and delivery lifecycle from the inception of business requirements to the administrati...
The pervasiveness of software is driving the dynamics of business transactions everywhere. We live in a time of a highly competitive and truly global economy where the question being answered among businesses now is “who can innovate the fastest?” To keep pace with the increasing velo...
My father used to tell me that the key to success in life was to look people in the eye and give them a firm handshake. But the art of the handshake seems to have died in my generation. I grew up in the era of high fives, forearm smashes and fist pumps. I played baseball, so there were...
This is how a typical software product lifecycle works : You gather requirements, build a prototype, detail out the architecture and design, develop the product, test it, deploy the product, handle migration and maintenance and ensure product support. This is a closed loop where the Pr...
Do you have a plan in place if your business were to meet with disaster? Would your business be able to operate or would it be out of operation for the unforeseeable future? Luckily today, technology makes it possible to mitigate the damages that a disaster can cause to a business. The...
Cloud computing delivers on-demand IT resources that provide businesses flexibility. The challenge is the cost and complexity of cloud security compliance (PCI, HIPAA, FFIEC). Raxak Protect automated cloud security enables cloud apps to be deployed quickly and cost-effectively. Get the...
No, this isn't a tirade on the security of IoT. It's about story about change. Specifically, change and its implications on security. Change is constant. There's a million different axioms and proverbs about change, so it's really hard to choose just one to sum up how it impacts sec...
Organizations are now three times more likely to adopt cloud-based provisioning of recovery sites. Disaster Recovery as a Service (DRaaS) is a critical offering for cloud providers as it offers a non-intrusive solution for end users to effectively evaluate the cloud and become more ame...
You can never be too careful. Security is on everyone’s mind. Not too long ago, we talked about how beefed up security impacts load testing and we want to continue the conversation. How do you keep yourself and your company safe in the age of industrial and state-sponsored hacking? In ...
The revocation of Safe Harbor has radically affected data sovereignty strategy in the cloud. In his session at 17th Cloud Expo, Jeff Miller, Product Management at Cavirin Systems, will discuss how to assess these changes across your own cloud strategy, and how you can mitigate risks ...
The cloud promises agility for companies wanting to utilize it for Big Data, but it can be challenging to understand all the new options and approaches – from IaaS and PaaS to newer services like HaaS and BDaaS. It’s an important concept to understand as more than half of enterprises p...
SYS-CON Events announced today that Cavirin will exhibit at the 17th International CloudExpo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Cavirin engineers security and compliance solutions to protect the elastic enterprise ag...
Modern Infrastructure-as-a-Service (IaaS) fundamentally breaks most traditional security tools and approaches. The number of environments used by enterprises is exploding beyond traditional data centers and virtualization. Workloads are becoming elastic with shorter lifespans. Mergers ...
Enterprises can achieve rigorous IT security as well as improved DevOps practices and Cloud economics by taking a new, cloud-native approach to application delivery. Because the attack surface for cloud applications is dramatically different than for highly controlled data centers, a d...
Latest figures from the Cloud Industry Forum (CIF) indicate that cloud adoption is at its highest figure to date, with 78 per cent of organisations now having formally adopted at least one type of cloud-based service. TechNavio echoes this surge and in particular the surge in growth of...
As-a-service models offer huge opportunities, but also complicate security. It may seem that the easiest way to migrate to a new architectural model is to let others, experts in their field, do the work. This has given rise to many as-a-service models throughout the industry and across...
Too many multinational corporations delete little, if any, data even though at its creation, more than 70 percent of this data is useless for business, regulatory or legal reasons.[1] The problem is hoarding, and what businesses need is their own “Hoarders” reality show about people wh...
Saviynt Inc. has announced the availability of the next release of Saviynt for AWS. The comprehensive security and compliance solution provides a Command-and-Control center to gain visibility into risks in AWS, enforce real-time protection of critical workloads as well as data and auto...
A security profile should be at the top of the developer’s list when compiling a mobile app but that’s hardly the case. That’s a pity, because building a profile is easier to do during the dev phase. Are most mobile apps putting your data at risk? Most likely so. According to the most ...
Data loss happens, even in the cloud. In fact, if your company has adopted a cloud application in the past three years, data loss has probably happened, whether you know it or not. In his session at 17th Cloud Expo, Bryan Forrester, Senior Vice President of Sales at eFolder, will pre...
In recent years, at least 40% of companies using cloud applications have experienced data loss. One of the best prevention against cloud data loss is backing up your cloud data. In his General Session at 17th Cloud Expo, Bryan Forrester, Senior Vice President of Sales at eFolder, wil...
Has your organization ever been attacked from the inside? Most companies would say no. In the latest report from the SANS Institute “Insider Threats and the Need for Fast and Directed Response”[1] only 34 percent of the more than 770 IT/security professionals in a range of industries s...
SYS-CON Events announced today that Secure Infrastructure & Services will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Secure Infrastructure & Services (SIAS) is a managed ser...
Learn how Backup as a Service can help your customer base protect their data. In his session at 17th Cloud Expo, Stefaan Vervaet, Director of Strategic Alliances at HGST, will discuss the challenges of data protection in an era of exploding storage requirements, show you the benefits...
Finjan Holdings, Inc. (NASDAQ: FNJN), has announced that the United States Patent and Trademark Office (USPTO) has granted its subsidiary, Finjan Inc., with U.S. Patent No. 9,141,786 (the '786 Patent) covering malicious mobile code runtime monitoring system and methods. Exponential gro...
SYS-CON Events announced today that Cloud Raxak has been named “Media & Session Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Raxak Protect automates security compliance across private and p...
If you’re in business, you have data. And if you’re like a lot of businesses, you have a lot of data. And it’s not only coming from your customers, it’s coming from other business units, partners, in-house applications, the cloud, hardware logs, etc. And that data could help you be bet...
Does your data center strategy contain a few, potential dark, rain clouds of unknown costs, sustainability of business continuity? Business continuity has to be purpose driven with real, practical goals while maintaining an achievable cost of ownership. In his session at 17th Cloud E...
Businesses want to take advantage of the flexibility and cost benefits of running applications in the public cloud. To balance the benefits and risks, businesses need to deliver consistent security compliance across both private and public clouds. To develop their security compliance s...
A hacked server is a system administrators worst nightmare, but it’s how you handle it that separates the professionals from the dilatantes.