Welcome!


Latest Articles from Cloud Security
Tunisie Electronique, a Tunisian IT services provider, improved their IT service management offerings and capabilities leveraging cloud-based services. To learn more about better IT control and efficiency using the latest ITSM tools and services, we are joined by Fadoua Ouerdiane, IT ...
NaviSite, Inc., a Time Warner Cable company, has opened a new enterprise-class data center located in Santa Clara, California. The new data center will enable NaviSite to meet growing demands for its enterprise-class Cloud and Managed Services from existing and new customers. This faci...
In this demo at 15th Cloud Expo, Derek Tumulak, Vice President of Product Management at Vormetric, takes you through what Vormetric does, and some of the data security capabilities they offer. A lot of times you don't need high-tech solutions to solve problems; a lot of times it's educ...
CommVault has launched Simpana for Endpoint Data Protection, a new solution set designed to help protect and enable the mobile workforce by efficiently backing-up laptops, desktops and mobile devices and providing secure access and self-service capabilities. With today's mobile work...
Cloud has become part of the enterprise landscape with nearly 90 percent of businesses having adopted cloud-based apps and services. However, organizations need to make sure that these cloud solutions don’t compromise the hard-won security policies that govern the rest of the informati...
NaviSite, Inc. has received the Global and Americas VMware Partner Network Award in the Service Provider Partner of the Year category. The award was presented at VMware Partner Exchange 2015, VMware’s annual partner event, held in San Francisco. “I am pleased to recognize this select ...
SYS-CON Media announced today that Vormetric launched a popular blog feed on Cloud Computing Journal with almost 5,000 story reads. Cloud Computing Journal aims to show how and why Cloud Computing is an opportunity for business to implement low cost, low power and high efficiency syst...
Eighty-five percent of companies store information in some sort of unstructured manner. In this demo at 15th Cloud Expo, Mark Fronczak, Product Manager at Solgenia, discussed their enterprise content management solution, which was created to help companies organize and take control of ...
This is the first security book I have read on Android that was not primarily about hacking the Android platform. This book completely covers all the tools available to the Android software architects and developers. Instead of showing us how to root the device at the beginning of t...
Exploiting weak identity credentials is one of the most common elements of most attacks. Even attacks that seem unrelated to users, such as recent point of sale (POS) attacks at well-known retailers like the ones you have mentioned, can be traced to insecure passwords. Often, the same ...
The cloud is becoming the de-facto way for enterprises to leverage common infrastructure while innovating and one of the biggest obstacles facing public cloud computing is security. In his session at 15th Cloud Expo, Jeff Aliber, a global marketing executive at Verizon, discussed how t...
IBM has announced software that allows people to hide or anonymize their personal information on the Web, ensuring protection from identity theft and other misuse. Developed by researchers at IBM's laboratory in Zurich, Switzerland, the software – called Identity Mixer – will enable co...
Vormetric on Wednesday announced the results of its 2015 Insider Threat Report (ITR), conducted online on their behalf by Harris Poll and in conjunction with analyst firm Ovum in fall 2014 among 818 IT decision makers in various countries, including 408 in the United States. The report...
Simply by having access, privileged users may unwittingly put data at risk – or be used by an outside actor as a conduit for siphoning data. Unsurprisingly, privileged accounts are very attractive targets for attackers seeking to leverage access privileges for their own nefarious purpo...
The trend of virtual currencies is likely not a fad; we’re merely seeing the beginning of what will likely turn into a common practice. Network security revolving around virtual currency exchanges still needs to improve, but once that happens, those improvements may even solve network ...
The cloud is proving to be a useful tool for businesses both large and small. What started out as an innovative idea has quickly transformed into a vital component of many business practices. As time goes on, demand for cloud storage has only increased with each passing year as more an...
VASCO Data Security International, Inc., announced on Wednesday that The Bank of Tokyo-Mitsubishi UFJ, Ltd. (BTMU) has implemented VASCO's two-factor authentication solutions to protect retail banking customers accessing the bank's online banking services. DIGIPASS for Mobile for smar...
Cloud computing is your future operational platform, (virtual) data center, and application platform – all rolled into one concept from multiple vendors. The following are 25 recent statistics about the current and future state of the cloud that will help you understand the breadth of ...
The Internet of Things needs an entirely new security model, or does it? Can we save some old and tested controls for the latest emerging and different technology environments? In his session at Internet of @ThingsExpo, Davi Ottenheimer, EMC Senior Director of Trust, will review hands-...
Connected devices are changing the way we go about our everyday life, from wearables to driverless cars, to smart grids and entire industries revolutionizing business opportunities through smart objects, capable of two-way communication. But what happens when objects are given an IP...
Bitium, based in Santa Monica, CA, works in the cloud to provide secure management of an enterprise's applications, users, and passwords in one place. We asked company Co-founder and CEO Scott Kriz a few questions about the company's vision and strategy. Cloud Computing Journal: Wh...
"The next generation of technology solutions will transform lives, businesses and economies." This is the theme at this year's Dell World opening keynote and this view is supported by Gartner's Top 10 Strategic Technology Trends for 2015:Computing Everywhere - As mobile devices continu...
Almost everyone sees the potential of Internet of Things but how can businesses truly unlock that potential. The key will be in the ability to discover business insight in the midst of an ocean of Big Data generated from billions of embedded devices via Systems of Discover. Businesses ...
SYS-CON Events announced today that IDenticard will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. IDenticard™ is the security division of Brady Corp (NYSE: BRC), a $1.5 billion manufacturer of ...
Every organization should follow a proactive rather than a reactive approach to protect against threats, risks, and vulnerabilities to which if their IT infrastructure is exposed can lead to data loss, regulatory penalties, lawsuits, and damaged reputation. Moving on the same lines, to...
DevOps, Cloud and Your SDLC Cloud computing started a technology revolution; now DevOps is driving that revolution forward. By enabling new approaches to service delivery, cloud and DevOps together are delivering even greater speed, agility, and efficiency. No wonder leading innovat...
The move to the cloud brings a number of new security challenges, but the application remains your last line of defense. In his session at 15th Cloud Expo, Arthur Hicken, Evangelist at Parasoft, to discuss how developers are extremely well-poised to perform tasks critical for securin...
In a recent webinar, Porticor’s AWS cloud security experts took on the security challenges companies face when migrating to AWS (and other IaaS clouds) and offered alternatives that enable IT Directors to take advantage of the cloud, while maintaining control of their data and its secu...
Editor’s note: This post by Invincea CEO Anup Ghosh first appeared at LinkedIn. We knew this would be of interest to you and posted it here with the author’s permission.-bg I’ll say it up front, your security program does not work because it is based on three common m...
UPDATE (9/28/2014): Our security team indicates that we're now seeing the majority of attempted exploits of Shellshock coming in through input paramters. They've provided ASM signatures to mitigate and recommend customers use these signatures to protect their applications. You ...
Multi-Cloud Bootcamp, being held Nov 4-5, 2014, in conjunction with 15th Cloud Expo in Santa Clara, CA, delivers a real-world demonstration of how to deploy and configure a scalable and available web application on all three platforms. The Cloud 360 Bootcamp, led by Janakiram MSV, an a...
For retailers everywhere, it’s a challenging new day. Security threats are a constant – both inside their four walls and out. The big security breaches we hear about on the news; the smaller ones sometimes not. But their impact remains costly to us all. The need for mobility, rapidly e...
Yet another retailer has confessed that their systems were breached and an untold number of victims join the growing list of those who have had their data was stolen. This one could be bigger than the infamous Target breach. I wonder if some day we’ll be referring to periods of time by...
Come learn about what you need to consider when moving your data to the cloud. In her session at 15th Cloud Expo, Skyla Loomis, a Program Director of Cloudant Development at Cloudant, will discuss the security, performance, and operational implications of keeping your data on premise, ...
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in – unannounced and unnoticed. By the time these thieves get in, t...
As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. Enterprises must protect their data from (i) system administrators who don’t need to see the data in the clear and (ii...
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands...
JP Morgan Chase has announced that in June and July of this year over 76 million retail clients and over 7 million business clients had there personal information stolen from various company websites. The sites identified were: Chase.com, JPMorganOnline, Chase Mobile and JPMorgan Mobil...
Pegasystems Inc. (NASDAQ: PEGA), the software company powering the digital enterprise, today announced it will host its second annual Pega Developers Conference (PDC) at the Hyderabad International Convention Centre October 12 - 13, 2014. The two day conference is designed to respond t...
Content Delivery Networks (CDNs) are a traditional mechanism for both improving the delivery speed of a web site while also reducing the network load on the origin servers that provide the web site. The CDN accomplishes these two goals by offloading static content from the origin web s...