Cloud Security

Some Server Storage I/O Benchmark Workload Scripts | Part 1 This is part one of a two-part series of posts about using some common server storage I/O benchmark tools and workload scripts. View part II here which includes the workload scripts and where to view sample results. Ther... (more)
The next BriefingsDirect data and security transformation use-case scenario describes how Tangerine Bank in Toronto has improved its speed to new business initiatives by gaining data-security agility. We'll now learn how improving end-user experiences for online banking and maki... (more)
Opining about the future of AI at the recent Brilliant Minds event at Symposium Stockholm, Google Executive Chairman Eric Schmidt rejected warnings from Elon Musk and Stephen Hawking about the dangers of AI, saying, “In the case of Stephen Hawking, although a brilliant man, he’s ... (more)
Cognitive Business: When Cloud and Cognitive Computing Merge Cloud computing has taken over the business world! With almost maniacal focus, single proprietors and Board Directors of the world's largest conglomerates see this new model as a "must do". This rapid shift is, in fact... (more)
Eight Security Considerations for API Testing By Cameron Laird It seems like every day we see reminders of the importance of thorough security testing from all areas of the software world. Security has become an especially critical consideration for APIs in recent years. Organizat... (more)
The Blind Spot of the Security Industry: SSH User Keys More than 95 percent of the world's enterprises rely on SSH user keys to provide administrators and developers an effective means of gaining encrypted access to critical infrastructure: operating systems, applications, payment... (more)
Download Slide Deck: ▸ Here Download Slide Deck: ▸ Here How to Transform Your Cloud Validation Strategy from Cloudy to Clear Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house cl... (more)
It feels like the barbarians are continually at the gate. We can't seem to go more than a week before a new data breach is in the news, impacting potentially millions of individuals. The targets range from companies like Omni Hotels, which had been breached affecting up to 50,000... (more)
Download Slide Deck: ▸ Here Download Slide Deck: ▸ Here What Your Cloud Vendor May Not Be Telling You Choosing the right cloud for your workloads is a balancing act that can cost your organization time, money and aggravation - unless you get it right the first time. Economics,... (more)
Clouds are typically classified into four different topologies: private, public, community and hybrid clouds. Let's focus on hybrid clouds: what are the use cases that require this topology, what are the challenges, and who stands to benefit from the hybrid cloud trend? First of... (more)
Security (SSL) Has a Performance Tax By Mehdi Daoudi While on a call with a customer last week, I was faced with the question of why the customer’s site had slowed down, even after they had switched to full SSL. Well, to be honest, it’s pretty obvious; SSL is more expensive from ... (more)
UpGuard has become a member of the Center for Internet Security (CIS), and will continue to help businesses expand visibility into their cyber risk by providing hardening benchmarks to all customers. By incorporating these benchmarks, UpGuard's CSTAR solution builds on its lead i... (more)
Download Slide Deck: ▸ Here Download Slide Deck: ▸ Here Extreme Computing in the Cloud...How to Get It for FREE! Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications... (more)
Yes this post is about the #Brexit, but it's about your data more importantly! As a company that has a large customer and open source user community in the EU, I thought a quick note on some considerations following the Brexit vote were in order. This is not an opinion piece, as... (more)
Are you still pondering whether to integrate cloud computing services into the structure of your IT network? You are not the only one. Most IT professionals are very concerned about data security, so they aren’t that willing to switch to cloud computing solutions that easily. It... (more)
SYS-CON Events announced today that Venafi, the Immune System for the InternetTM and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1-3, 2016, at the Santa Clara Conventio... (more)
How to Transform Your Cloud Validation Strategy from Cloudy to Clear Security, data privacy, reliability, and regulatory compliance are critical factors when evaluating whether to move business applications from in-house, client-hosted environments to a cloud platform. Quality as... (more)
The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Digital Transformation, Mi... (more)
SYS-CON Events announced today that MangoApps will exhibit at the 19th International Cloud Expo, which will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. MangoApps provides modern company intranets and team collaboration software, all... (more)
A data breach could happen to anyone. Data managed by your company is valuable to someone, no matter what the data is. Everything has a price tag on the dark web. It is especially true when it is customer data, such as personal and payment card details. When your customers' data... (more)
© 2008 SYS-CON Media