Cloud Security

Using Data Science to Solve Cloud Security Challenges Most of us already know that adopting new cloud applications can boost a business's productivity by enabling organizations to be more agile and ready to change course in our fast-moving and connected digital world. But the r... (more)
SYS-CON Events announced today that Secure Channels will exhibit at the 19th International Cloud Expo, which will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The bedrock of Secure Channels Technology is a uniquely modified and enhance... (more)
SYS-CON Events announced today that Numerex Corp, a leading provider of managed enterprise solutions enabling the Internet of Things (IoT), will exhibit at the 19th International Cloud Expo | @ThingsExpo, which will take place on November 1-3, 2016, at the Santa Clara Convention ... (more)
Analysis of 25,000 applications reveals 6.8% of packages/components used included known defects. Organizations standardizing on components between 2 - 3 years of age can decrease defect rates substantially. Open source and third-party packages/components live at the heart of high ... (more)
Does a Content Delivery Network (CDN) protect against Distributed Denial of Service (DDoS) attacks? It's a good question. A CDN by its very nature will absorb DDoS attacks for the content that it serves and this could be considered protection but, as is often the case, this is on... (more)
Enabling patient-doctor trust goes a long way in a provider's ability to provide care. Trust is also critical for enabling network connections that are safe, to help secure health networks. The healthcare industry is scrambling to shore up defenses as cyberattacks and breaches i... (more)
Phishing has been around since the dawn of the internet. The term was first used in an AOL Usenet group back in 1996 but it wasn’t until 2003 when many baited hooks and lures started dropping. Popular transaction destinations like PayPal and eBay were some of the early victims of... (more)
Reducing IT Operation Costs with Windows 10 Hello for Business The newer Windows 10 devices with the Hello extensions are definitely going to have a cost implication, but in today's context in our own consumer world where every individual has access to Smartphones with advanced bi... (more)
It was a Monday. I was reading the Internet. Okay, I was skimming feeds. Anyway, I happened across a title that intrigued me, "Stateful Apps and Containers: Squaring the Circle." It had all the right buzzwords (containers) and mentioned state, a topic near and dear to this applic... (more)
Regulatory Compliance in the Cloud Regulatory requirements exist to promote the controlled sharing of information, while protecting the privacy and/or security of the information. Regulations for each type of information have their own set of rules, policies, and guidelines. Clo... (more)
Lifeboat Distribution has expanded their distribution agreement with AVG Technologies allowing distribution into the North America, Latin America and Caribbean market place. AVG Technologies began their partnership with Lifeboat Distribution i n 2010. "Lifeboat Distribution shar... (more)
Financial Institutions are Vulnerable to Cyber Attack as the Increase in Technologies Improves It is impossible to go outside and not notice banks offering consumers new ways to save, send, spend, and access their money at a bank. This trend-to ease access to funds – extends wel... (more)
Download Slide Deck: ▸ Here Download Slide Deck: ▸ Here How Cloud-Based Service Providers Can Use Security as an Advantage Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increase... (more)
With all the excellent training available on television today, we are all now well prepared to deal with the coming Zombie Apocalypse.  Our failure as a society lies, however, in our misunderstanding of the nature of the cybersecurity challenge. This failure threatens us all and ... (more)
DevOps and Microservices - An In-Depth Look at Security Challenges DevOps and microservices are permeating software engineering teams broadly, whether these teams are in pure software shops but happen to run a business, such Uber and Airbnb, or in companies that rely heavily on s... (more)
The hype around data breaches in the health industry may seem commonplace and cause complacency. Last year, it was Anthem and Premera Blue Cross suffering attacks affecting nearly 90 million people combined. Among others, last month it was Banner Health - a nationwide health syst... (more)
Our walls of security prevention are actually being surmounted every day - we just don't always know it. Assaults from within the network, as well as zero-day threats, are driving new types of solutions referred to as "advanced threat detection" (ATD). ATD brings in real-time pac... (more)
Intersections: DevOps, Release Engineering, and Security Derek: Good morning, Paul. There's a lot those pursuing DevOps can learn from Release Engineering practices. I know you've got a lot of experience to share, so let's get started. J. Paul Reed: Good morning, it's good to be ... (more)
Making Our Internet Great Again We are always online. We access our data, our finances, work, and various services on the Internet. But we live in a congested world of information in which the roads were built two decades ago. The quest for better, faster Internet routing has b... (more)
In Privilege We Trust: Locking Down Super-Users for Maximum Cybersecurity Privileged Identity Management (PIM) is the lowest common denominator in today's most treacherous corporate and governmental security breaches. Or more accurately: Privilege Mismanagement. Sony, Target, Anth... (more)
© 2008 SYS-CON Media