Welcome!


Latest Blogs from Cloud Security
A Man in the Middle attack, or MITM, is a situation wherein a malicious entity can read/write data that is being transmitted between two or more systems (in most cases, between you and the website that you are surfing). MITMs are common in China, thanks to the “Great Cannon.” The “Gre...
The past decade has seen an increasing trend in employees using mobile devices like smartphones and tablets to aid in their work. This trend has fostered organizations to adopt practices like bring-your-own-device (BYOD) with hopes of improving employee productivity and efficiency. The...
Software-defined is a concept that refers to the ability to control some or all of the functions of a system using software. The concept is sometimes incorrectly characterized as a buzzword or marketing jargon, when in fact it has a clear meaning that needs to be understood by organiza...
Everyone wants their device of choice right there next to them 24/7. To an employer, however, that smart device is nothing more than a dagger posed to rip apart every shred of corporate security. This reality of modern business was highlighted by the Information Security Community on ...
You can turn a microwave into a camera and I’ll teach you how in a minute, but before I do, let me share this news item. In a recent interview with a reporter from the Bergen Record, Kellyanne Conway was asked about surveillance. She responded: “There are many ways to surveil each othe...
VeriStor Systems has announced that CRN has named VeriStor to its 2017 Managed Service Provider (MSP) 500 list in the Elite 150 category. This annual list recognizes North American solution providers with cutting-edge approaches to delivering managed services. Their offerings help comp...
From 2006 to 2011, Power Ventures operated a groundbreaking online communications, personal data management, and social networking aggregator hosted at the website www.power.com. Power offered registered users the capacity to access multiple online social networks (e.g., LinkedIn, Twit...
There is no more effective way to reduce your overall test environment spend than to migrate to cloud test environments and embrace testing and infrastructure automation. The nature of test environments is inherently temporary—you set up an environment, run through an automated test su...
vdiconImagine not having to carry around a laptop or be sitting in a cubicle to access your work desktop applications. Virtual desktop infrastructure (VDI) is appealing to many different constituencies because it combines the benefits of anywhere access with desktop support improvement...
In today’s globally connected world, data security breaches are bound to occur. This, in turn, increases the importance of digital forensic readiness, or the ability to access and trust computer log data in the identification of a breach and the determination of what datasets may have ...
When it comes to organizing and coordinating your data, you should start creating a simple plan today. Have you ever wondered how massive corporations achieve high levels of success and seem to be perfectly organized from the inside out? That’s because they have systems and structures ...
Ransomware attacks escalated dramatically in 2016. In fact, there was a 300 percent increase in ransomware attacks last year, according to the FBI, to an average of 4,000 attacks a day, up from 1,000 ransomware attacks a day in 2015. What’s more, organizations are targeted more frequen...
As software continues to pervade our lives, the security of that software continues to grow in importance. We need to keep private data private. We need to protect financial transactions and records. We need to protect online services from infiltration and attack. We can obtain this p...
As cloud computing becomes the information technology mainstream, data center technology is accelerating at a breakneck speed. Concepts like software define infrastructure, data center analytics and Nonvolatile Memory Express (NVMe) over Fabrics are changing the very nature of data cen...
Powerful Denial of Service attacks are becoming increasingly common. A Distributed Denial of Service attack is when the attacker uses multiple machines to flood the resources of the target to overwhelm it and deny the legitimate users access to the service. The DDoS attack on Dyn in Oc...
Smart phones. Smart TVs. Smart toilet seats (yes that is a thing!). Let’s face it, smart technology surrounds us. It has become a de facto part of our everyday lives. The Internet of Things is growing at breakneck speeds. No matter which analyst you read, the growth predictions are sta...
We are mobile, our devices are mobile, the networks we connect to are mobile and the applications we access are mobile. Mobility, in all its iterations, is a huge enabler and concern for enterprises and it’ll only get worse as we start wearing our connected clothing to the office. If ...
A BriefingsDirect thought leadership panel discussion explores how public-sector organizations can gain economic benefits from cloud interoperability and standardization. Our panel comes to you in conjunction with The Open Group Paris Event and Member Meeting October 24 through 27, 20...
I work from Boston 4 days a week and we're in the middle of a blizzard. (Note: I commute to Boston. I live 4 days a week at Unitrends' Boston/Burlington offices and 3 days a week at Unitrends' Columbia South Carolina offices. So it's fair to note that given my South Carolina roots t...
One of the unfortunate effects of the continued evolution of the load balancer into today’s application delivery controller (ADC) is that it is often too easy to forget the basic problem for which load balancers were originally created—producing highly available, scalable, and predicta...
In just the past ten or so years, consumer devices have swamped enterprises. Along with those devices have come apps and services and the expectation of ease and convenience from technology. The consumerization of IT is more than just the need to support and monitor personal devices on...
A cybersecurity transformation discussion on how cloud security is rapidly advancing, and how enterprises can begin to prevail over digital disruption by increasingly using cloud-defined security. We'll examine how a secure content collaboration services provider removes the notion of...
As cloud security is rapidly advancing, enterprises can begin to prevail over digital disruption by increasingly using cloud-defined security. The next BriefingsDirect cybersecurity innovation and transformation panel discussion explores how cloud security is rapidly advancing, and ho...
The entire intent of load balancing is to create a system that virtualizes the “service” from the physical servers that actually run that service. A more basic definition is to balance the load across a bunch of physical servers and make those servers look like one great big server to ...
Fred Wilson of Union Square Ventures has been talking a lot about the blockchain recently, so I decided to learn more about it. I read the Marketing the Blockchain e-book, watched The Grand Vision of a Crypto-Tech Economy video and the video keynote of Overstock CEO Patrick Byrne at th...
The healthcare industry is not immune from today’s relentless wave of cyberattacks. Cyber theft of protected health information (PHI) is on the rise, and health organizations understand that 100 percent prevention of attacks is not realistic. According to Ponemon Institute’s Sixth Ann...
The “willing suspension of disbelief” is the idea that the audience (readers, viewers, content consumers) is willing to suspend judgment about the implausibility of the narrative for the quality of the audience’s own enjoyment. We do it all the time. Two-dimensional video on our screen...
Your car. My toaster. Our lights. The neighbor’s thermostat. With an average of 7.8 connected devices per home, according to recent surveys, there are twice as many “things” in the house as the average 3.14 people per household in the US in 2015. And all of them are “talking.” Not al...
We continue with the second part of our two-part series. If you missed the first part, we are discussing what security professionals can learn from the hit series, "Mr. Robot." The series explores the world of organized hacking as well as the security measures being used to stop the ha...
Enabling patient-doctor trust goes a long way in a provider’s ability to provide care. Trust is also critical for enabling network connections that are safe, to help secure health networks. The healthcare industry is scrambling to shore up defenses as cyberattacks and breaches increas...
I recently recovered from ACDF surgery where they remove a herniated or degenerative disc in the neck and fuse the cervical bones above and below the disk. My body had a huge vulnerability where one good shove or fender bender could have ruptured my spinal cord. I had some items remove...
CloudJumper, a Workspace as a Service (WaaS) platform innovator for agile business IT, has been recognized with the Customer Value Leadership Award for its nWorkSpace platform by Frost & Sullivan. The company was also featured in a new report(1) by the industry research firm titled, “D...
"Coalfire is a cyber-risk, security and compliance assessment and advisory services firm. We do a lot of work with the cloud service provider community," explained Ryan McGowan, Vice President, Sales (West) at Coalfire Systems, Inc., in this SYS-CON.tv interview at 19th Cloud Expo, hel...
It is not often that movies and television shows give viewers the opportunity to explore the world of hacking and digital security in a realistic manner. After two seasons, "Mr. Robot" has attracted its share of IT professionals as well as average citizens. The show has offered numerou...
Home-maintenance repair and services provider ServiceMaster develops applications with a security-minded focus as a DevOps benefit. To learn how security technology leads to posture maturity and DevOps business benefits, we're joined by Jennifer Cole, Chief Information Security Office...
A recent report by Praetorian, a cybersecurity company headquartered in Austin, TX, focused on threats that resulted in data compromise or access to sensitive information. Based on a review of 100 separate internal penetration test engagements the study identified the five most prevale...
The seemingly miraculous hand-held devices we use today are a far cry from the computers of old. Capabilities, speed, affordability and storage have increased dramatically, transforming every aspect of our lives. As a point of reference, the first data centers were rooms that housed hu...
Seeing how a chorus of business leaders and tech innovators has sung praises to the cloud for quite some time, you're probably aware of the fact that the cloud adaptation is simply flourishing. According to research from cloud solutions provider RightScale, roughly 93% of business toda...
The rise of the cloud has put Messaging and Collaboration in the dark when it comes to measuring the service delivered to end-users. Since they don’t have any view of what is happening at the server level, the only way for them to know what is going on is to be able to replicate the en...
SYS-CON Events announced today that Impiger Technologies will exhibit in Booth #109 at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Impiger Technologies is a world-class, enterprise software pr...