Welcome!


Latest Blogs from Cloud Security
Eliminating waste is by far my favorite part of the agile approach to software. In a world where the entirety of a piece of software is designed up front, I might ship and learn only after the fact that nobody ever uses the software's WhizBang feature. That's brutal - the entire ...
Fusion has announced that a major East Coast hospital system has signed a three year, $1.5 million agreement with Fusion to upgrade the healthcare institution's communications infrastructure, facilitating its migration to the cloud while protecting its significant technology investment...
According to a study, 82 percent of federal IT professional respondents reported that they were using the NIST (National Institute of Standards and Technology) cybersecurity framework to improve their security stance. The survey also demonstrated that the document is being used as a st...
Although corporate giants realized the danger of cyber attacks and cyber crime in general, especially after attacks on Sony and Zappos, as well as the very sensitive data breach that struck Ashley Madison website, small businesses still don't do much for making their networks more secu...
Shadow IT is here to stay. IT departments need to appreciate that it is so culturally inbuilt that shutting it down is now impossible; in fact, policies punishing the use of third-party apps would more likely push rogue users deeper into the darkness. The battle that can be won is to b...
This redpaper discusses how IBM Bluemix™ cloud platform offers technologies that make it easy for cloud-based SoEs to securely connect to on-premises IBM mainframes, creating a fully secure, end-to-end, SoE-SoR environment.
The recent uptick in cyber attacks across all sectors of the economy, have reinforced for CIOs the need to be able to address corporate boards and customers on their strategies for protection and resilience for the coming 2016 year. Cloud, Big Data, and the liability issues in the n...
Cloud has become an extension of today’s enterprise and the traditional perimeter has long disappeared. Increasing business requirements for agility and flexibility make the cloud-extended enterprise ideal for a workforce that works anywhere, anytime and any place. This is especially t...
The year 2015 is soon coming to an end as the year 2016 looks to be ushering in exciting new ways in which the Internet of Things (IoT) is changing our way of life. It’s easy to see these transformations taking shape on the consumer side (home automation, smart appliances, connected ca...
As IIoT systems create ever more critical dependencies in plant, energy infrastructure, and transportation environments, developers and deploying organizations will turn to hardware-enabled cybersecurity to stave off proliferating cyberattacks. Although the use of secure processors ...
The Dell Fellows program recognizes engineers for their outstanding and sustained technical achievements, engineering contributions and advancement of the industry. They are also seen as top innovators that have distinguished themselves through ingenuity, intellectual curiosity and inv...
ThoughtWorks has issued the latest Technology Radar, an assessment of trends significantly impacting software development and business strategy. The Technology Radar sets out the current changes in software development - things in motion to pay attention to based upon ThoughtWorks' day...
Imagine for a moment that you have three doors in front of you containing the data your clients have backed up. Behind door number one lies a complicated clutter of data, various files, and unidentifiable information. Behind door number two you have a data desert, with little or no ava...
As organizations shift towards IT-as-a-service models, the need for managing & protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection & E-Discovery of your data - whether in a private cloud, a Service Provider delive...
This morning on #c9d9 we spoke with two industry veterans and published authors - James DeLuccia and Jonathan McAllister - on how to bake-in security and compliance into your DevOps processes, and how DevOps and automation can essentially help you pass your next audit.
The quest to understand production and operational factors, distribute this information to business systems and people within an organization, and directly improve business processes and profitability as a result is not new. In fact, it has been embraced by companies for decades. This ...
It's a well-known adage that curiosity killed the cat, but this drive to figure things out is something that can be critical for software testers. People are often taught from an early age to question everything in order to gain a higher understanding. This characteristic is something ...
If you’re a vendor of a cybersecurity product and you’re hammering out your value proposition, you might assume that prevention is a stronger value proposition than deterrence, and mitigation is the weakest of the three. After all, mitigation presumes a successful attack, right? In ...
"We enable organizations to solve the key challenges around the security and compliance of hybrid clouds. We like to also capitalize on this new phenomenon called DevSecOps, which is making sure that security is built in as you release these platforms into the cloud," explained JD Sher...
Public safety answering point (PSAP) has relatively remained unchanged over an extended period of time. However, due to emerging technology PSAP is changing dramatically and it is becoming invaluable to many agencies that deal with public safety. The change can be directly attributed t...
Wi-Fi has become a necessity of the digital age, and like everything, everyone loves it even more when it is free. Whether it’s used to access a presentation at a new client meeting, to host a video conference call, or edit and email important documents, public Wi-Fi means nearly anywh...
What if you knew, through legal means, something about someone where you could intervene to deliver advice to help them perform better or stay out of danger? Should you act on that? I was recently delivering a lecture at a major university in Texas and one of the participants posed a ...
I didn’t want to be so dramatic, but I couldn’t help but be completely honest as well. The end possibility is that your entire organization may suffer the fate as Sony Pictures, Target, Anthem and others that have been shaken by hacks and vulnerabilities in their networks. In some case...
For the last 15 years, companies operating in the United States and Europe have benefited from Safe Harbor - a streamlined process that allowed U.S. companies to transfer and store European citizens' data in the U.S. provided a level of privacy protections were adhered to according to ...
It is important to accept that threats come in many forms and can affect businesses greatly, for example, 15 per cent of large organisations suffered from a security or data breach in the last year involving smartphones or tablets. With increased employee mobility, businesses must equi...
It’s a given that employee access to corporate systems should be both as secure and simple as possible. Up until recently however, time-strapped CIOs, under pressure from demanding staff and challenged with authenticating users all over the world on multiple devices, have been torn bet...
Anonymous’s self-organization gives it power, resilience, and above all, agility – in fact, far more than traditional organizations with vastly superior resources. On the other hand, its efforts are often capricious, and once a particular target loses its appeal, Anonymous’s attention ...
Cyber insurance is an important element for companies as it covers the damage and liability caused by a hack, which are usually excluded from traditional liability coverage. Stricter data privacy notification laws, government incentives, cloud adoption and the increase in high-profile...
Big Data is a growing trend, making it possible for businesses of every kind to gather, store, and use the unlimited personal and private data found on the internet. This massive collection allows them to predict trends, determine consumer tastes, and hone marketing plans for the great...
As cloud computing continues to grow in importance, enterprises are now facing a new realization. In their almost rampant embrace of cost savings associated with public cloud, many are just now understanding the information technology governance challenge posed by vastly different trad...
This article originally appeared on F5.com on 10.20.15. With Halloween in our rearview mirror and the holiday shopping season upon us, a couple surveys are out examining our fears and in particular, our concerns about identity theft. Apparently, ID theft is not so scary anymore –...
Cybersecurity is a complex field, and with laws varying across states and countries, keeping cloud usage compliant can become a real headache for enterprise security decision-makers. As regulations continue to lag behind the rapid pace of technological advancements, many IT security pr...
The next few years could see a paradigm shift in the way anti-virus applications work. A number of businesses have started migrating from traditional desktop based anti-virus packages to "lighter" software apps that process desktop security on the cloud. At the outset, this change is n...
How often do you get questions like ‘Have you gone to the cloud yet?’, or ‘Why aren’t we in the cloud?’, or a myriad of others along those same lines. People still talk like the cloud is a destination. I discussed this tendency last year in a blog, “The Cloud – Is It Your Actual Destin...
The age of mobile applications, pervasive use of social media and growing demand for accurate consumer data are converging to drive significant changes in how organizations connect with and market to their respective customer bases — as well as the technologies they use to do so. It’s ...
Many would argue that our critical infrastructure energy projects are only as reliable and secure as the technology serving them. Security will ultimately be the limiting factor on how much IoT is deployed. The traditional trade off of is either “easy to use” or “secure”, but not both ...
Soha Systems Co-Founder and CEO Haseeb Budhani will be a featured speaker in the “Dev” Developer Focus track during DevOps Summit 2015, November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Budhani’s presentation, “Security Practices that Can Hinder Your Business...
The traditional, on-premise computing model has established processes, accreditations, certifications, governance and compliance rules - FISMA, NERC CIP, HIPAA, PCI-DSS, IRS 1075. While the security industry is aggressively addressing the technical security gaps in cloud-driven service...
Disaster recovery (DR) has traditionally been a major challenge for IT departments. Even with the advent of server virtualization and other technologies that have simplified DR implementation and some aspects of on-going management, it is still a complex and (often extremely) costly un...
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across priv...