Cloud Security

Security of Smart Things With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is found... (more)
In the first article of this three-part series on hybrid cloud security, we discussed the Shared Responsibility Model, and examined how the most common attack strategies persist, are amplified, or are mitigated as assets move from data centers to the cloud. In part two, we talke... (more)
You can turn a microwave into a camera and I’ll teach you how in a minute, but before I do, let me share this news item. In a recent interview with a reporter from the Bergen Record, Kellyanne Conway was asked about surveillance. She responded: “There are many ways to surveil eac... (more)
IoT Security Certifications In his session at @ThingsExpo, Eric Lachapelle, CEO of the Professional Evaluation and Certification Board (PECB), will provide an overview of various initiatives to certifiy the security of connected devices and future trends in ensuring public trus... (more)
AlertLogic's 'Security Built for the Cloud' Demo Download Slide Deck: ▸ Here Download Slide Deck: ▸ Here In their Live Hack" presentation at 17th Cloud Expo, Stephen Coty and Paul Fletcher, Chief Security Evangelists at Alert Logic, provided the audience with a chance to see a... (more)
Four Questions to Ask When It's Time to Modernize Your Data Center Cloud computing is here to stay. The agility and scalability of the cloud model - as well as  its ability to transform up-front capital expenditures into flexible operating expenditures - are too compelling to ign... (more)
VeriStor Systems has announced that CRN has named VeriStor to its 2017 Managed Service Provider (MSP) 500 list in the Elite 150 category. This annual list recognizes North American solution providers with cutting-edge approaches to delivering managed services. Their offerings hel... (more)
IoT and the Implications for Security Inside and Outside the Enterprise In the enterprise today, connected IoT devices are everywhere - both inside and outside corporate environments. The need to identify, manage, control and secure a quickly growing web of connections and outsid... (more)
In the age of global cyberattacks, corporate enterprises and government agencies that have some type of cloud-based network solutions should be looking at a strategic design focus that guarantees a very secure intelligent infrastructure unsusceptible to cyberattacks or natural di... (more)
"Peak 10 is a national cloud data center solutions managed services provider, and part of that is disaster recovery. We see a growing trend in the industry where companies are coming to us looking for assistance in their DR strategy," stated Andrew Cole, Director of Solutions En... (more)
Download Slide Deck: ▸ Here Download Slide Deck: ▸ Here Extreme Computing in the Cloud...How to Get It for FREE! Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications... (more)
Download Slide Deck: ▸ Here Download Slide Deck: ▸ Here What to Consider Before Moving a Database into a Public Cloud The cloud competition for database hosts is fierce. How do you evaluate a cloud provider for your database platform? Download Slide Deck: ▸ Here In his sessio... (more)
SYS-CON Events announced today that Fusion, a leading provider of cloud services, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Fusion, a leading provider of integrated cloud solutions ... (more)
Control Costs: Use Cloud Test Environments By Dalibor Siroky There is no more effective way to reduce your overall test environment spend than to migrate to cloud test environments and embrace testing and infrastructure automation. The nature of test environments is inherently t... (more)
2017 Predictions: Cloud-Based Software Development Accelerates By William Hurley, Senior Director of Software Lifecycle Services, Astadia Adoption and use of cloud-based software engineering platforms will accelerate in 2017. Teams have been working in the cloud for a few years now,... (more)
One of the hottest areas in cloud right now is DRaaS and related offerings. In his session at 16th Cloud Expo, Dale Levesque, Disaster Recovery Product Manager with Windstream's Cloud and Data Center Marketing team, discussed the benefits of the cloud model, which far outweigh th... (more)
Securing the Software Defined Data Center Download Slide Deck: ▸ Here The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking mar... (more)
Proactive vs. Reactive - A Better Approach to Cloud Security How will your company move to the cloud while ensuring a solid security posture? Organizations from small to large are increasingly adopting cloud solutions to deliver essential business services at a much lower cost. ... (more)
What is VDI? Imagine not having to carry around a laptop or be sitting in a cubicle to access your work desktop applications. Virtual desktop infrastructure (VDI) is appealing to many different constituencies because it combines the benefits of anywhere access with desktop suppo... (more)
In today's globally connected world, data security breaches are bound to occur. This, in turn, increases the importance of digital forensic readiness, or the ability to access and trust computer log data in the identification of a breach and the determination of what datasets may... (more)
© 2008 SYS-CON Media