Welcome!


Latest Articles from Cloud Security
The Workspace-as-a-Service (WaaS) market will grow to $6.4B by 2018. In his session at 16th Cloud Expo, Seth Bostock, CEO of IndependenceIT, will begin by walking the audience through the evolution of Workspace as-a-Service, where it is now vs. where it going. To look beyond the desk...
Cryptography has become one of the most underappreciated, misunderstood components of technology. It’s too easy for salespeople to dismiss concerns with three letters that nobody wants to question. ‘Yes, of course, we use AES.’ But what exactly are you trusting to be the ultimate guar...
As organizations shift toward IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection &E-Discovery of your data – whether in a private cloud, a Service Provider delive...
Years ago companies saw a major improvement in efficiency in the heyday of virtualization. As the world looked to the cloud to solve business challenges these savings were forgotten. Today we live in a post cloud world with pre-virtualization efficiencies. In his session at 16th Clou...
Dorothy the CIO was walking the yellow brick road of planning. She was on her way to the Emerald City to ask the great wizard of the agile data center for advice. Along the way she met two other CIOs who joined her on the journey, nicknamed Tin Man and Scarecrow. Their travels brought ...
Twistlock unveiled a security suite designed to give enterprises the visibility and control they need over their container-based applications and data. Twistlock’s breakthrough container security enables enterprises to maximize the efficiency, portability and scalability of their conta...
SYS-CON Events announced today that Site24x7, the cloud infrastructure monitoring service, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Site24x7 is a cloud infrastructure monitoring servi...
SYS-CON Events announced today that SafeLogic has been named “Bag Sponsor” of SYS-CON's 16th International Cloud Expo® New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. SafeLogic provides security products for applications in mobile and server...
SYS-CON Events announced today that Dyn, the worldwide leader in Internet Performance, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Dyn is a cloud-based Internet Performance company. Dyn ...
SYS-CON Events announced today that Blue Box has been named “Bronze Sponsor” of SYS-CON's DevOps Summit New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. Blue Box delivers Private Cloud as a Service (PCaaS) to a worldwide customer base. Built ...
A network-centric systems approach to IoT has begun to dramatically affect physical security. The opportunity reaches well beyond simply connecting new sensors and information sources. Integration of sensors and controllers is a necessary step and serves as a foundation for generating ...
SYS-CON Events announced today that Secure Infrastructure & Services will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY, and the 17th International Cloud Expo®, which will take place on November ...
Chuck Piluso will present a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. Speaker Bio: Prior to Secure Infrastructure and Services, Mr. Piluso founded North American Telecommunication Corporation, a facilities-based Competiti...
How do you securely enable access to your applications in AWS without exposing any attack surfaces? The answer is usually very complicated because application environments morph over time in response to growing requirements from your employee base, your partners and your customers. ...
SYS-CON Events announced today that Litmus Automation will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Litmus Automation’s vision is to provide a solution for companies that are in a rush to ...
Web application security. Everyone knows how important it is (and if they don't, they should) and yet the complexity of managing services that provide it often result in, shall we say, less than holistic coverage of applications. At least that seems to be the case given some rather dis...
SYS-CON Events announced today that IDenticard will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. IDenticard™ is the security division of Brady Corp (NYSE: BRC), a $1.5 billion manufacturer of ...
Les Hazlewood, Stormpath CTO, already showed you how to build a Beautiful REST+JSON API. Now learn how to secure your API, handle API authentication, and manage API keys and authentication tokens for server, JavaScript and Mobile clients. Les will deep dive into technical best practic...
Learn about the current state of security breaches and what it is costing businesses. One of my recent conversations with a Cloud security expert at a conference opened up doors to some new information for me personally. Our conversation was around the current status of the Cloud Indu...
One of the hottest areas in cloud right now is DRaaS and related offerings. In his session at 16th Cloud Expo, Dale Levesque, Disaster Recovery Product Manager with Windstream's Cloud and Data Center Marketing team, will discuss the benefits of the cloud model, which far outweigh the...
This book does a great job of covering all the security topics you need to know about to work successfully in a decent size enterprise. This book is a beast!!! It is 100% textbook, with a lot of exercises at the end of the chapters. If your class uses this book, get ready for a fire h...
One of the most difficult things to do today is to identify a legitimate user. Part of the problem is that the definition of a legitimate users depends greatly on the application. Your public facing website, for example, may loosely define legitimate as "can open a TCP connection and s...
Keeping data from getting out into the wild or being damaged by cyber attackers is what keeps CISOs, the executive team and boards of directors up at night. To protect organizations, cybersecurity needs to be automated and real-time, it needs to learn contextually like we do and it nee...
The concept of a cloud facilitating applications is by no means new. Those of us who diagrammed network connectivity around 1993 will recall drawing a big puffy cloud symbol in between two local area networks. The cloud represented the mysterious Internet – that mash-up of routers and ...
The GoDaddy customer breaches didn’t have to happen and don’t have to happen to you. Cisco threat researchers recently reported a dramatic uptick in Angler Exploit Kit-based attacks connected to compromised GoDaddy domain registry accounts. GoDaddy, which manages nearly a third of al...
Recent events have taught us that everyone is vulnerable to data breaches. Now that the majority of businesses are running services in the cloud, whether sanctioned, rogue or Shadow IT, there is much work to be done in beefing up cloud security. And, with each major data breach that ta...
Application troubleshooting survey reveals integrated tools lead to significant response time improvements Thirty-seven percent of developers rely on user notifications to identify issues, yet integrated tools reduce customer impact by 62%. See the Infographic below or download the c...
When it comes to cybersecurity initiatives, the U.S. government has not taken a back seat. Perhaps owning to the number of high profile breaches and damaging insider attacks that have occurred in the past few years, this White House in particular has been very vocal about the federal g...
Even as cloud and managed services grow increasingly central to business strategy and performance, challenges remain. The biggest sticking point for companies seeking to capitalize on the cloud is data security. Keeping data safe is an issue in any computing environment, and it has bee...
FedRAMP is mandatory for government cloud deployments and businesses need to comply in order to provide services for federal engagements. In his session at 16th Cloud Expo, Abel Sussman, Director for Coalfire Public Sector practice, will review the Federal Risk and Authorization Mana...
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and b...
SYS-CON Media announced today that Symantec, a provider of leading security, backup and availability solutions for where vital information is stored, accessed and shared, has launched new ad campaigns on SYS-CON's i-Technology sites, which include Cloud Computing Journal, DevOps Journa...
Organizations from small businesses to the enterprise are increasingly adopting cloud solutions to deliver essential business services. According to cyber-security experts, the frequency and severity of cyberattacks are on the rise, causing alarm to businesses and customers across a va...
The free version of KEMP Technologies' LoadMaster™ application load balancer is now available for unlimited use, making it easy for IT developers and open source technology users to benefit from all the features of a full commercial-grade product at no cost. It can be downloaded at Fre...
Tunisie Electronique, a Tunisian IT services provider, improved their IT service management offerings and capabilities leveraging cloud-based services. To learn more about better IT control and efficiency using the latest ITSM tools and services, we are joined by Fadoua Ouerdiane, IT ...
NaviSite, Inc., a Time Warner Cable company, has opened a new enterprise-class data center located in Santa Clara, California. The new data center will enable NaviSite to meet growing demands for its enterprise-class Cloud and Managed Services from existing and new customers. This faci...
In this demo at 15th Cloud Expo, Derek Tumulak, Vice President of Product Management at Vormetric, takes you through what Vormetric does, and some of the data security capabilities they offer. A lot of times you don't need high-tech solutions to solve problems; a lot of times it's educ...
CommVault has launched Simpana for Endpoint Data Protection, a new solution set designed to help protect and enable the mobile workforce by efficiently backing-up laptops, desktops and mobile devices and providing secure access and self-service capabilities. With today's mobile work...
Cloud has become part of the enterprise landscape with nearly 90 percent of businesses having adopted cloud-based apps and services. However, organizations need to make sure that these cloud solutions don’t compromise the hard-won security policies that govern the rest of the informati...
NaviSite, Inc. has received the Global and Americas VMware Partner Network Award in the Service Provider Partner of the Year category. The award was presented at VMware Partner Exchange 2015, VMware’s annual partner event, held in San Francisco. “I am pleased to recognize this select ...