Welcome!


Latest Blogs from Cloud Security
SYS-CON Events announced today that Alert Logic, Inc., the leading provider of Security-as-a-Service solutions for the cloud, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Alert Logic has a...
Modern threat defense presents many new challenges to enterprises, resulting from the sophisticated threat techniques, new threat actors like organized cybercrime groups and nation states, and the ever-evolving IT infrastructure. Advanced malware threats are fundamentally different fro...
DevOps simply represents the better fusion of the usually quite distinct departments of software engineering and IT operations. The goal is faster and safer rates of software innovation. A simple objective but a troublesome one in reality – As many experts explain the core issue is th...
How well do you know your code? It sounds like a strange question, but please indulge me. Maybe you're a manager or business analyst. If this is the case, you ‘know' the code through a translation layer in which the developers in your organization explain what it does. Sometimes ...
OneCloud Systems provides managed services for the cloud including 24/7 monitoring, server and database setup, administration, and website migration. Launched by senior architects, developers and system administrators, OneCloud Systems enables customers to tap into the full value of th...
I am sure you are aware, the business computing environment is evolving. From all of us and the multitude of devices we now carry and interact with, along with the various ways we access information…to all of the applications and the interdependency among those applications that we req...
There once was a time when organizations wouldn’t consider deploying critical applications in the cloud. It was too much of a business risk from both an access and an attack perspective—and for good reason, since 28 percent of enterprises have experienced more security breaches in the ...
For more than 10 years, the rapid rise of cloud computing has enabled an even more rapid application of cloud to genomic medicine. In fact, since the U.S. National Institutes of Health (NIH) lifted a 2007 ban on uploading their genomic data into cloud storage, the explosion in cloud us...
We’re doing something a little different this year at #RSA with a Security Octagon. Everyone loves a good debate and in the security community discussions pop up constantly around a myriad of topics at any given point – with individuals or groups in the community taking opposing sides ...
The battle lines are clear: the FBI is using the courts to try to force Apple to write malware that will provide a backdoor into the iPhone the Feds recovered at the recent San Bernardino terrorist shootings – but Apple is fighting the order tooth and nail, as such malware would weaken...
We protect our homes with a single front door (generally speaking) don’t we? Should our approach to cyber security be any different? Shouldn’t we be able to look to one single security layer for protection? Given the proliferation and diversity of malware, viruses, hacks, phishing, on...
The Internet of Things (IoT) is growing at a rapid pace with millions of new devices getting connected every day. Gartner forecasts that 6.4 billion connected things will be in use in 2016 and by 2020, the number will reach 20.8 billion. Billions of devices including smartphones, lapt...
In a recent market study offering by Transparency Market Research (TMR), the global cloud security market is projected to grow at a CAGR of 12.80% from 2015 to 2022. The report, titled "Cloud Security Market - Global Industry Analysis, Size, Share, Growth, Trends and Forecast 2014 - 20...
Earlier this week it was reported that researchers at Boston-based security company, Rapid7, identified several security flaws in an app connected to a new toy from Mattel's Fisher-Price brand. The news of the security vulnerability caught our attention for a few reasons: The name of...
Time for a blog about personal privacy, before we all have forgotten about the concept. The Circle is both the title of an 2009 album by Bon Jovi as a 2013 novel by Dave Eggers. A novel relevant for a cloud blog because it describes a future in which one company (the Circle) largely co...
The start of a new year is always a good time for many businesses to get their IT strategies in place. However, there has been one issue in the past couple of months that may potentially cause a lot of complications in IT departments across the US and EU; the implications for cloud com...
No seriously, I mean it. There are serious correlations and similarities between smuggling alcohol and piracy in any form, whether it’s the real life bad guys on ghost ships in the seas or digital pirates who download stuff off the internet thinking it’s all free stuff while some artis...
As 2016 has arrived, we reflect upon one of the most debated issues around DevOps in 2015 – Information Security (InfoSec) and compliance. Needless to say, both are critical to an enterprise (especially given past examples of data breaches and looming cybersecurity threats). As a resul...
Imagine if Ben Grimm, aka The Thing, didn’t have such distinctive characteristics like an orange rocky body, blue eyes or his battle cry, ‘It’s Clobberin’ Time!’ and had to provide a photo ID and password to prove he was a founding member of the Fantastic Four. Or if the alien in John ...
I recently caught up with a former co-worker who now runs an information security program for a well-known retailer. While discussing new advances in cloud security and technology, he mentioned that his company had met with a provider that presented him with a mind-numbing number of de...
You can’t seem to have a conversation about cloud technology and its impact on the business without the topic of Shadow IT coming up. The two concepts at times seem so tightly intertwined, one would think there is a certain inevitability, almost a causal linkage between them. Shadow IT...
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Dat...
How do you securely enable access to your applications in AWS without exposing any attack surfaces? The answer is usually very complicated because application environments morph over time in response to growing requirements from your employee base, your partners and your customers. I...
The ability to check the status of IronPort’s health and usage is critical — and we allow you to do so from the same dashboard that also monitors the messaging servers. When IronPort fails, the entire email flow is shut down, meaning nobody in your organization can send or receive emai...
Eliminating waste is by far my favorite part of the agile approach to software. In a world where the entirety of a piece of software is designed up front, I might ship and learn only after the fact that nobody ever uses the software's WhizBang feature. That's brutal - the entire ...
Fusion has announced that a major East Coast hospital system has signed a three year, $1.5 million agreement with Fusion to upgrade the healthcare institution's communications infrastructure, facilitating its migration to the cloud while protecting its significant technology investment...
According to a study, 82 percent of federal IT professional respondents reported that they were using the NIST (National Institute of Standards and Technology) cybersecurity framework to improve their security stance. The survey also demonstrated that the document is being used as a st...
Although corporate giants realized the danger of cyber attacks and cyber crime in general, especially after attacks on Sony and Zappos, as well as the very sensitive data breach that struck Ashley Madison website, small businesses still don't do much for making their networks more secu...
Shadow IT is here to stay. IT departments need to appreciate that it is so culturally inbuilt that shutting it down is now impossible; in fact, policies punishing the use of third-party apps would more likely push rogue users deeper into the darkness. The battle that can be won is to b...
This redpaper discusses how IBM Bluemix™ cloud platform offers technologies that make it easy for cloud-based SoEs to securely connect to on-premises IBM mainframes, creating a fully secure, end-to-end, SoE-SoR environment.
The recent uptick in cyber attacks across all sectors of the economy, have reinforced for CIOs the need to be able to address corporate boards and customers on their strategies for protection and resilience for the coming 2016 year. Cloud, Big Data, and the liability issues in the n...
Cloud has become an extension of today’s enterprise and the traditional perimeter has long disappeared. Increasing business requirements for agility and flexibility make the cloud-extended enterprise ideal for a workforce that works anywhere, anytime and any place. This is especially t...
The year 2015 is soon coming to an end as the year 2016 looks to be ushering in exciting new ways in which the Internet of Things (IoT) is changing our way of life. It’s easy to see these transformations taking shape on the consumer side (home automation, smart appliances, connected ca...
As IIoT systems create ever more critical dependencies in plant, energy infrastructure, and transportation environments, developers and deploying organizations will turn to hardware-enabled cybersecurity to stave off proliferating cyberattacks. Although the use of secure processors ...
The Dell Fellows program recognizes engineers for their outstanding and sustained technical achievements, engineering contributions and advancement of the industry. They are also seen as top innovators that have distinguished themselves through ingenuity, intellectual curiosity and inv...
ThoughtWorks has issued the latest Technology Radar, an assessment of trends significantly impacting software development and business strategy. The Technology Radar sets out the current changes in software development - things in motion to pay attention to based upon ThoughtWorks' day...
Imagine for a moment that you have three doors in front of you containing the data your clients have backed up. Behind door number one lies a complicated clutter of data, various files, and unidentifiable information. Behind door number two you have a data desert, with little or no ava...
As organizations shift towards IT-as-a-service models, the need for managing & protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection & E-Discovery of your data - whether in a private cloud, a Service Provider delive...
This morning on #c9d9 we spoke with two industry veterans and published authors - James DeLuccia and Jonathan McAllister - on how to bake-in security and compliance into your DevOps processes, and how DevOps and automation can essentially help you pass your next audit.
The quest to understand production and operational factors, distribute this information to business systems and people within an organization, and directly improve business processes and profitability as a result is not new. In fact, it has been embraced by companies for decades. This ...