Welcome!


Latest Articles from Cloud Security
We show you how to dig deep to find hidden and covert processes, clandestine communications, and signs of misconduct on your network. In a previous article [1], I described how to obtain a memory image from a Windows computer that would allow forensic analysis. I briefly discussed us...
Last week Ivan Pepelnjak wrote an article about the failure domains of controller based network architectures. At the core of SDN solutions is the concept of a controller, which in most cases lives outside the network devices themselves. A controller as a central entity controlling the...
The keys to the digital kingdom are credentials. In no industry is this more true (and ultimately more damaging) than financial services. The sophistication of the attacks used to gather those credentials and thwart the increasingly complex authentication process that guards financial ...
The key to securing your mobility is to understand how it is being used in your environment and what is potentially at risk. Taking stock of the mobile devices, applications and traffic in your network is critical to identifying how your data and resources are potentially vulnerable. ...
When you plan your migration to the cloud, and the cloud security best practices to secure it, there is no need to reinvent the wheel.  Here is some advice from the Fortune 500. Use these tips to learn from others’ successes and to avoid their failures – maybe their companies can...
TechWell, IBM, uTest, and Keynote partnered on a powerful new survey that explores where today’s testers are spending their time, what obstacles they most often encounter, and where they think their attention should be focused. Hear what others are saying about this valuable survey rep...
Cloud and Big Data present unique dilemmas: embracing the benefits of these new technologies while maintaining the security of your organization's assets. When an outside party owns, controls and manages your infrastructure and computational resources, how can you be assured that sensi...
Significant money is at stake and in need of protection in the Payment Card Industry (PCI). The global payment card industry covers several sectors: banks and financial institutions (acquirers), issuers, processors, service providers, merchants carrying out transactions online and via ...
The cloud is expanding. More applications are being run online. More data is being stored online. More businesses are relying on public, private, and hybrid clouds for their apps, records, and backups. And more hackers are taking advantage. Why Security Breaches Happen in the Cloud Hac...
According to Gartner, Big Data refers to "high volume, high velocity, and/or high variety information assets” – and, this is the key – “that require new forms of processing to enable enhanced decision making, insight discovery and process optimization." While Big Data may seem like an ...
Security is critical to Internet of Things (IoT) adoption because we want to make sure we can trust the sensors, actuators, rules engines and other connected componentry we embed in every element of our existence. Bringing this down to earth is as easy as pointing out that people's sma...
The promise of easy, rapid, and low-cost deployment is luring increasing numbers to the cloud. Is security the only remaining obstacle to total domination by the cloud? In his session at 14th Cloud Expo, John Gunn, VP of Corporate Communications for VASCO Data Security, will examine ho...
This Lab Validation report from Enterprise Strategy Group (ESG) provides you with best practices to create an environment that offers you simple unified data protection across physical and virtual landscapes, maximum protection and data availability, and reduced storage needs and opera...
From the way legal teams prepare for trial to how they communicate with clients and other professionals, technology is quickly becoming an influential member of the practice. However, even in today’s technology-driven world, not all firms can label themselves tech savvy. To help those ...
It’s an oft-cited FEMA statistic that 40 percent of small businesses never reopen after a disaster. Almost certainly contributing to this eye-popping failure rate is the fact that an estimated 74 percent of small to mid-sized businesses (SMBs) lack a disaster recovery plan, while 84 pe...
In 2012, an IDG survey of enterprise cloud computing adoption showed that 70 percent of respondents said security was among their top three concerns, and two years later, not much has changed. The Everest Group Enterprise Cloud Adoption Survey released in March of 2014 shows that 70 pe...
Against the backdrop of a new survey demonstrating significant cost savings that can be attained by Federal Government adoption of cloud computing, AT&T* on Tuesday announced a highly secure cloud-based storage solution designed specifically to meet the robust security requirements of ...
The cloud plays an integral role in enabling the agility required to take advantage of new business models and to do so in a very convenient and cost-effective way. However, this also means that more personal information and business data will exist in the cloud and be passed back and ...
IDenticard Access Control is a leading manufacturer of integrated access control solutions to protect employees, visitors, and facilities. Owned by Brady Corporation (NYSE:BRC), a $1.15 billion manufacturer of identification products, IDenticard Access Control draws on its 30 years of ...
Over the past few years, enterprises have been moving to the cloud to streamline processes and operations. A study last year by TheInfoPro indicated that there is no sign of cloud investment slowing down – predicting an average growth rate of cloud spending of 36 percent from this year...
Today's datacenters face a gauntlet of challenges including protection of physical and virtual environments, fast recovery of data, reducing backup times and storage requirements, server consolidation, and disaster recovery. How are savvy CIOs conquering these types of challenges? Find...
SYS-CON Events, Inc. named Cisco "Gold Sponsor" of upcoming Cloud Expo, co-located with 3rd International Internet of @ThingsExpo, the largest IoT event in the world. 15th International Cloud Expo will take place November 4-6, 2014 at the Santa Clara Convention Center in Santa Clara, C...
It is only fitting that the 20th anniversary of the Gartner Hype Cycle has the Internet of Things right at the top of the coaster. IoT is currently at the peak of Inflated Expectations. The Gartner Hype Cycle give organizations an assessment of the maturity, business benefit and future...
In a Feb 2014 survey, 94 percent of organizations surveyed reported running applications or experimenting with infrastructure-as-a-service[1]. According to research firm Nasumi, there is over one exabyte currently stored in the cloud. An exabyte is over a billion GB[2]. Considering the...
A recent Inc.com article claimed that the percentage of U.S. small businesses using cloud computing is expected to more than double during the next six years, from 37 percent to nearly 80 percent (l). This forecast was gleaned from a just released Emergent Research and Intuit study. Th...
The Internet of Things (IoT) is rapidly in the process of breaking from its heretofore relatively obscure enterprise applications (such as plant floor control and supply chain management) and going mainstream into the consumer space. More and more creative folks are interconnecting eve...
Chris Matthieu is Co-Founder & CTO at Octoblu, Inc. He has two decades of telecom and web experience. He launched his Teleku cloud communications-as-a-service platform at eComm in 2010 which was acquired by Voxeo. Next he built an opensource Node.JS PaaS called Nodester which was acqui...
Security professionals are constantly negotiating the tension of balancing ease-of-use with data security. Savvy security professionals know that their users will often choose a less secure technology that makes getting things done easier over a more secure technology that makes gettin...
Recent high profile security breaches at major online websites tell us static passwords are not the answer. Even recent SMS security additions to consumer websites do little to address the issue. Fortunately, a more secure authentication system is available for consumer websites that ...
IBM on Monday announced it has acquired the business operations of Lighthouse Security Group, LLC, a premier cloud computing security services provider. Lighthouse Security Group's Gateway platform protects identity and data in an increasingly complex IT environment where more company ...
Explosive technological advancement has created a molten landscape of disruption, reinvention and creation. New services arrive and become versatile building blocks for new ideas, products and businesses. As intuitive and intelligent technology relieves us of administrative burdens, we...
Evelyn de Souza is a cloud compliance and data privacy strategy leader at Cisco responsible for championing solutions to address emerging industry trends. She is a strong proponent of building repeatable processes that enable organizations to sustain compliance while optimizing data se...
The move to the cloud brings a number of new security challenges, but the application remains your last line of defense. In his session at 15th Cloud Expo, Arthur Hicken, Evangelist at Parasoft, to discuss how developers are extremely well-poised to perform tasks critical for securin...
Lantronix, Inc. (NASDAQ: LTRX), a leading global provider of smart IoT (Internet of Things) solutions, announced the worldwide availability of its new PremierWave® SE1000 -- a high performance, programmable, Ethernet-based System-on-Module (SOM) that enables hardware and software engin...
Many mid-market companies have invested significant time and resources to secure and back up their servers, client computers, data, and overall network infrastructure in what was the traditional client-server setup. Now, what were considered emerging technologies just a few years ago, ...
Encryption is a key element of a complete security strategy. The 2013 Global Encryption Trends Study shows a steady increase in the use of encryption solutions over the past nine years. Thirty-five percent of organizations now have an encryption strategy applied consistently across the...
This independent report from Info-Tech evaluates and scores 14 companies in the Virtual Machine Backup market. It can help you understand what's new in the virtual backup market, evaluate virtual backup vendors and products for your needs and determine which products are most appropria...
It is a mistake to think we can secure APIs using the same methods and technology that we used to secure the conventional, browser-centric web. Andi Mann from CA Technologies recently pointed out that, at every turn, customers are interacting more and more with businesses through appli...
Ramesh Kesanupalli is the Founder of Nok Nok Labs and a Founding Member of FIDO Alliance. SecuritySolutionsWatch.com: Thank you for joining us today, Ramesh. It’s an honor to speak with the founder of Nok Nok Labs and the visionary behind the creation of the FIDO Alliance. Before we d...
This white paper digs deep into the reasons testing mobile apps is fundamentally harder than traditional web or desktop applications. A collaboration by Tina Zhuo and Dennis Schultz from IBM along with Yoram Mizrachi from Perfecto Mobile and John Montgomery from uTest, these experts ex...