Cloud Security

Pokeman Go has been a raging success. But its launch was marred by frequent downtimes and dropped connections. In a recent chat at the Google Cloud Platform Next Conference, Niantic CTO Phil Keslin talked about the “hair on fire” experience where the team had to firefight and up... (more)
It is not often that movies and television shows give viewers the opportunity to explore the world of hacking and digital security in a realistic manner. After two seasons, "Mr. Robot" has attracted its share of IT professionals as well as average citizens. The show has offered n... (more)
Download Slide Deck: ▸ Here Download Slide Deck: ▸ Here Convergence: Empowering Enterprise Security with the Internet of Things The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is ... (more)
Download Slide Deck: ▸ Here Download Slide Deck: ▸ Here Regulatory Compliance in the Cloud Regulatory requirements exist to promote the controlled sharing of information, while protecting the privacy and/or security of the information. Regulations for each type of information h... (more)
Download Slide Deck: ▸ Here Download Slide Deck: ▸ Here Can Developers Benefit from Regulatory Compliance? Effectively SMBs and government programs must address compounded regulatory compliance requirements. The most recent are Controlled Unclassified Information and the EU's G... (more)
"Coalfire is a cyber-risk, security and compliance assessment and advisory services firm. We do a lot of work with the cloud service provider community," explained Ryan McGowan, Vice President, Sales (West) at Coalfire Systems, Inc., in this SYS-CON.tv interview at 19th Cloud Ex... (more)
Machine Learning May Be the Solution to Enterprise Security Woes By Karl Zimmerman For large enterprise organizations, it can be next-to-impossible to identify attacks and act to mitigate them in good time. That's one of the reasons executives often discover security breaches when... (more)
CloudJumper, a Workspace as a Service (WaaS) platform innovator for agile business IT, has been recognized with the Customer Value Leadership Award for its nWorkSpace platform by Frost & Sullivan. The company was also featured in a new report(1) by the industry research firm titl... (more)
2017 Security Predictions - Stay Vigilant, We're in for a Wild Ride 2016 brought about more cyberattacks than we thought possible, especially involving ransomware, and we definitely won't see that trend breaking stride in 2017. By next year, we expect every single adult in the U.S... (more)
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CO... (more)
Top 5 Reasons Why Security Teams Love Intelligent Deception Cyberattacks are relentless. The pace of attacks shows no sign of slowing, and organizations understand that 100 percent prevention of attacks is not possible. Traditional prevention and detection techniques are falling s... (more)
"Venafi has a platform that allows you to manage, centralize and automate the complete life cycle of keys and certificates within the organization," explained Gina Osmond, Sr. Field Marketing Manager at Venafi, in this SYS-CON.tv interview at DevOps at 19th Cloud Expo, held Nove... (more)
As cloud computing becomes the information technology mainstream, data center technology is accelerating at a breakneck speed. Concepts like software define infrastructure, data center analytics and Nonvolatile Memory Express (NVMe) over Fabrics are changing the very nature of da... (more)
Our Top 100 Sponsors and the Leading "Digital Transformation" Companies (ISC)2, 24Notion (Bronze Sponsor), 910Telecom, Accelertite (Gold Sponsor), Addteq, Adobe (Bronze Sponsor), Aeroybyte, Alert Logic, Anexia, AppNeta, Avere Systems, BMC Software (Silver Sponsor), Bsquare Corpor... (more)
Download White Paper ▸ Here Between 2005 and 2020, data volumes will grow by a factor of 300 - enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘Big Data' phenomenon. Unfortunately, traditional approaches to handling, storing and an... (more)
Internet of @ThingsExpo, taking place June 6-8, 2017 at Javits Center, New York City, is co-located with 20th International @CloudExpo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @CloudExpo / @ThingsExpo... (more)
Download Slide Deck: ▸ Here Download Slide Deck: ▸ Here Encryption in the Cloud: What You Need to Know Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the... (more)
Download Slide Deck: ▸ Here Download Slide Deck: ▸ Here Modernizing Existing Infrastructure with Truly Heterogeneous Software-Defined Storage Let's face it, embracing new storage technologies, capabilities and upgrading to new hardware often adds complexity and increases costs.... (more)
The next BriefingsDirect Voice of the Customer security transformation discussion explores how home-maintenance repair and services provider ServiceMaster develops applications with a security-minded focus as a DevOps benefit. To learn how security technology leads to posture ma... (more)
A recent report by Praetorian, a cybersecurity company headquartered in Austin, TX, focused on threats that resulted in data compromise or access to sensitive information. Based on a review of 100 separate internal penetration test engagements the study identified the five most p... (more)
© 2008 SYS-CON Media