|
|
Latest Articles from Cloud Security
By James Carlini  Bitcoins are a digital cryptocurrency and have been around since 2009. As a substitute for legal tender, they are becoming the rage for investors and others but because there is no government agency auditing or performing regulatory oversights, you wonder if it is the perfect breeding ... Dec. 29, 2017 11:45 AM EST Reads: 1,678 | By Ayman Sayed  As we head into a new year, IT improvements and management should be top of mind for any business looking to amp up their customer experience, delivery and service in 2018. Recently, at CA World ‘17, I talked about how every business strategy is now an IT strategy. With that in mind, I... Dec. 29, 2017 09:00 AM EST Reads: 958 | By Otto Berkes  Every year about this time, we gaze into crystal balls to divine the future of our industry – or at least where it’s headed over the next 365 days. The result is often a triumph of incrementalism: we predict that we will get more of what we already have. The truth is, technology isn’t ... Dec. 29, 2017 07:15 AM EST Reads: 1,025 | By Rostyslav Demush  Decentralization of everything, the great new idea of which the web can’t stop babbling, might still seem a bit utopian if you inspect it closely.
Yes, blockchains are likely to reshape our economy, or a huge part of it, and benefit considerably those who are currently unbanked.
They... Dec. 29, 2017 07:00 AM EST Reads: 1,256 | By Don MacVittie  Our work, both with clients and with tools, has lead us to wonder how it is that organizations are handling compliance issues in the cloud. The big cloud vendors offer compliance for their infrastructure, but the shared responsibility model requires that you take certain steps to meet ... Dec. 20, 2017 09:00 AM EST Reads: 2,003 | By Elizabeth White  "IBM is really all in on blockchain. We take a look at sort of the history of blockchain ledger technologies. It started out with bitcoin, Ethereum, and IBM evaluated these particular blockchain technologies and found they were anonymous and permissionless and that many companies were ... Dec. 18, 2017 03:45 PM EST Reads: 2,414 | By Darren Anstee  The National Cyber Security Awareness Month is transitory, but many of the decisions we have made around the adoption of technology within our personal and business have brought with them risks that will stay with us for a while. A good example of this is the deployment and proliferati... Nov. 18, 2017 11:00 AM EST Reads: 1,699 | By Greg Pierce  We’re seeing an emerging trend in the cloud computing world. I’ve been referring to it as cloud fatigue, but it’s more commonly known as repatriation, or moving workloads from the cloud back to on-prem locations. According to a recent 451 Research report, over 21 percent of organizatio... Nov. 17, 2017 02:00 PM EST Reads: 1,988 | By Pat Romanski  The next XaaS is CICDaaS. Why? Because CICD saves developers a huge amount of time. CD is an especially great option for projects that require multiple and frequent contributions to be integrated. But… securing CICD best practices is an emerging, essential, yet little understood pract... Nov. 2, 2017 06:00 AM EDT Reads: 2,721 | By Ambuj Kumar  Enron changed how U.S. public companies audit and report their financial data. There is also an opportunity to use the Equifax data breach to create a framework for better protection of our data in future.
The credit reporting agency reported one of the largest data breaches in the h... Oct. 6, 2017 01:00 PM EDT Reads: 2,472 | By Shelly Palmer  Every time there’s a notable cybersecurity breach, someone (even me) writes a comprehensive primer on the proper way to create “secure” passwords. Lather, rinse, repeat. Until a few years ago, everyone (including me) based their password advice on a 2003 paper from the National Institu... Oct. 4, 2017 05:00 AM EDT Reads: 3,541 | By XebiaLabs Blog  Imagine a world where product owners, Development, QA, IT Operations, and Infosec work together, not only to help each other, but also to ensure that the overall organization succeeds. By working toward a common goal, they enable the fast flow of planned work into production (e.g., per... Sep. 30, 2017 12:00 PM EDT Reads: 3,393 | By Ravi Rajamiyer  Not very long ago, in my IT consulting career, I used to be responsible for the launch of mission-critical applications that help enterprises leap into the cutting edge of the digital business revolution. There were a lot of hard skills required for leading such a mission that involved... Sep. 23, 2017 10:45 AM EDT Reads: 2,411 | By Liz McMillan  Your clients expect transactions to never fail, cloud access to be fast and always on, and their data to be protected - no exceptions. Hear about how Secure Service Container (SSC), an IBM-exclusive open technology, enables secure building and hosting of next-generation applications, b... Sep. 21, 2017 03:15 PM EDT Reads: 3,257 | By Stackify Blog  Because security is an increasing concern for developers, a new movement is emerging, known as DevSecOps, which encourages developers to bring security and standards to the forefront while building applications. That means there's good reason to stay on top of security information and ... Sep. 15, 2017 01:00 PM EDT Reads: 1,824 | By Liz McMillan  "As we've gone out into the public cloud we've seen that over time we may have lost a few things - we've lost control, we've given up cost to a certain extent, and then security, flexibility," explained Steve Conner, VP of Sales at Cloudistics,in this SYS-CON.tv interview at 20th Cloud... Sep. 15, 2017 05:15 AM EDT Reads: 4,513 | By Peter Silva  With 2017 crossing the half way point, let’s look at some technology trends thus far. Breaches: Many personal records are half empty due to the continued rash of intrusions while the crooks are half full of our personal information along with some ransom payments. According to the Iden... Sep. 9, 2017 12:00 PM EDT Reads: 2,156 | By Liz McMillan  As more and more companies are making the shift from on-premises to public cloud, the standard approach to DevOps is evolving. From encryption, compliance and regulations like GDPR, security in the cloud has become a hot topic. Many DevOps-focused companies have hired dedicated staff t... Sep. 8, 2017 03:00 PM EDT Reads: 3,398 | By Mamoon Yunus  API Security is complex! Vendors like Forum Systems, IBM, CA and Axway have invested almost 2 decades of engineering effort and significant capital in building API Security stacks to lockdown APIs. The API Security stack diagram shown below is a building block for rapidly locking down ... Aug. 31, 2017 10:00 AM EDT Reads: 2,784 | By Pat Romanski  Vulnerability management is vital for large companies that need to secure containers across thousands of hosts, but many struggle to understand how exposed they are when they discover a new high security vulnerability. In his session at 21st Cloud Expo, John Morello, CTO of Twistlock, ... Aug. 26, 2017 04:15 PM EDT Reads: 3,207 | By Liz McMillan  "We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv in... Aug. 25, 2017 05:45 AM EDT Reads: 9,771 | By Stackify Blog  Every company wants to see their company getting press and media attention. Unless it is due to a hacker and a security breach. Every few weeks you see in the media stories of companies who were hacked. Getting a new credit card every few months because the data was hacked has been rou... Aug. 22, 2017 05:00 PM EDT Reads: 2,225 | By Pat Romanski  Consumers increasingly expect their electronic "things" to be connected to smart phones, tablets and the Internet. When that thing happens to be a medical device, the risks and benefits of connectivity must be carefully weighed. Once the decision is made that connecting the device is b... Aug. 21, 2017 07:45 PM EDT Reads: 4,811 | By Pat Romanski  SYS-CON Events announced today that SkyScale will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. SkyScale is a world-class provider of cloud-based, ultra-fast multi-GPU hardwar... Aug. 17, 2017 09:15 PM EDT Reads: 3,136 | By Automic Blog  There's no escaping how essential IT has become to modern business; gone are the days where corporate life can continue without its IT systems. These days, across all industry sectors, critical business processes rely upon IT, and yet we're still being met by what feels like an age-old... Aug. 9, 2017 12:00 PM EDT Reads: 2,205 | By Fouad Khalil  Who is accountable for SSH-related, key-based access in your organization? In many enterprises, this is not clear, leading to assumptions that leave you vulnerable to attack and compliance violations as well. This article will address the challenge of SSH user key-based access from the... Aug. 6, 2017 01:00 PM EDT Reads: 2,831 | By Nitin Donde  As we have seen over and over again, a new wave of ransomware attacks has been plaguing large parts of Europe over the last couple of weeks. While the affected individuals and organizations are struggling with the very tangible business impact of the loss of revenue and operations, it’... Aug. 4, 2017 12:00 PM EDT Reads: 2,538 | By Kevin Sparenberg  Without a doubt, we’re at a tipping point when it comes to security and the Internet of Things (IoT). Recently, security flaws have been exposed in consumer products, including children’s toys, baby monitors, cars, and pacemakers. In late October 2016, Dyn®, an internet infrastructure ... Aug. 2, 2017 04:00 PM EDT Reads: 2,709 | By Daniel Joseph Barry  In its 2017 State of Malware Report, Malwarebytes Labs recorded a 267 percent increase in ransomware between January 2016 and November 2016, with over 400 different variants in total. The report noted that while malware authors mostly relied on ransomware to make the bulk of their reve... Jul. 19, 2017 07:15 AM EDT Reads: 3,489 | By Elizabeth White  In his session at @ThingsExpo, Eric Lachapelle, CEO of the Professional Evaluation and Certification Board (PECB), provided an overview of various initiatives to certify the security of connected devices and future trends in ensuring public trust of IoT. Eric Lachapelle is the Chief Ex... Jul. 17, 2017 03:00 AM EDT Reads: 5,250 | By James Carlini  In the age of global cyberattacks, corporate enterprises and government agencies that have some type of cloud-based network solutions should be looking at a strategic design focus that guarantees a very secure intelligent infrastructure unsusceptible to cyberattacks or natural disaster... Jun. 23, 2017 12:00 PM EDT Reads: 5,650 | By Liz McMillan  For financial firms, the cloud is going to increasingly become a crucial part of dealing with customers over the next five years and beyond, particularly with the growing use and acceptance of virtual currencies. There are new data storage paradigms on the horizon that will deliver sec... Jun. 6, 2017 06:15 AM EDT Reads: 3,299 | By Liz McMillan  SYS-CON Events announced today that Outscale, a global pure play Infrastructure as a Service provider and strategic partner of Dassault Systèmes, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY... Jun. 5, 2017 01:00 PM EDT Reads: 3,910 | By Elizabeth White  SYS-CON Events announced today that Tappest will exhibit MooseFS at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. MooseFS is a breakthrough concept in the storage industry. It allows you to secure stored da... Jun. 2, 2017 06:00 AM EDT Reads: 8,429 | By Elizabeth White  SYS-CON Events announced today that DivvyCloud will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. DivvyCloud software enables organizations to achieve their cloud computing goals by simplifying a... May. 29, 2017 09:45 AM EDT Reads: 4,033 | By Elizabeth White  When NSA's digital armory was leaked, it was only a matter of time before the code was morphed into a ransom seeking worm. This talk, designed for C-level attendees, demonstrates a Live Hack of a virtual environment to show the ease in which any average user can leverage these tools an... May. 27, 2017 01:00 PM EDT Reads: 2,697 | By Liz McMillan  Cloud-based disaster recovery is critical to any production environment and is a high priority for many enterprise organizations today. Nearly 40% of organizations have had to execute their BCDR plan due to a service disruption in the past two years. Zerto on IBM Cloud offer VMware and... May. 24, 2017 12:45 PM EDT Reads: 3,505 | By Liz McMillan  SYS-CON Events announced today that Fusion, a leading provider of cloud services, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Fusion, a leading provider of integrated cloud solutions to sm... May. 23, 2017 11:45 PM EDT Reads: 10,859 | By Ed Featherston  I was recently on a business trip out to Wausau, WI. The purpose was to conduct a training session on web application development for a new batch of associates at our onshore development center. When I picked up my rental car at the airport, I was very happy to discover it had built in... May. 18, 2017 10:00 AM EDT Reads: 9,429 | By Pat Romanski  SYS-CON Events announced today that StorageCraft Technology Corp, a global leader in backup and disaster recovery, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY.
The StorageCraft family of c... May. 14, 2017 04:30 AM EDT Reads: 8,694 |
|
|
|
About Cloud Security
Web Security Journal covers the booming market of security software, applications and services for the enterprise, offering timely updates on industry news and providing how-to articles on improving Internet and Data security including IT security's new frontier: Cloud Computing.
ADD THIS FEED TO YOUR ONLINE NEWS READER
|