Choosing the right secure file transfer vendor in today's heightened security & compliance landscapeJune 17, 2015
As mobile technologies, cloud computing, and always-connected environments continue to enable fluid movement of data, organizations must consider solutions that meet both current, and future needs.
At the upcoming 2013 SC Awards US, Porticor hopes to take home the Best Cloud Computing Security award.
Both companies strengthened identity verification policies for customers after a tech writer's online accounts were hacked.
Many of today's applications are designed to work over any port, which increases chances they won't be blocked by firewalls.
Authenticating to a SaaS application in the cloud should be simple. It now Is.
Cisco has acquired Milpitas, Calif.-based Virtuata, a security software start-up that safeguards virtual machine data, for an undisclosed sum.
Driven by increasing use of cloud and mobile services, and cyber criminal activity from hacktivists, terrorist groups, nation-state actors and those out for financial gain, the global cyber security market is expected to grow by 11.3 percent each year.
It's not just data that is at risk with a mobile workforce, it's the whole shebang: data, applications, operating environments and, we hope, security.
Small and midsize businesses will continue implementing cloud services, perhaps jumping to a quarter of all security spending by 2016, according to a soon-to-be-released report.
With emerging technologies that must be controlled, the demand to align business risk with security is growing. As such, the IT role is being reinvented under our feet, and those who function more like a CIO will rule the world.
While it has revolutionized collaboration, the cloud can also bring with it potentially serious security ramifications, like intellectual property theft or data breaches.
The decision to move to the cloud has always been wrought with anxiety over entrusting one's data to a third-party. Learning which questions to ask of a provider can help mitigate that concern.
Risks exist in the e-discovery process, as sensitive information frequently moves and is stored outside a company's firewall.
Be wary of vendor messaging in light of today's threats, as it may be misguided. Organizations can cope with the latest concerns by applying tried-and-true security best practices.
Given the cost benefits, security pros likely can do little to stop their organization from migrating to the cloud. That's why they must do all they can to control the risk.
Nobody would leave their car unlocked in a public parking lot...so why is it so many are leaving the servers unlocked in the cloud?
When Apple announced iCloud at its Worldwide Developers Conference last June, it set acolytes abuzz with anticipation.
Throughout the day, SC Magazine will be announcing the finalists from each of its 32 award categories, covering the Reader Trust, Professional and Excellence sections.
Researchers have uncovered a now-fixed authentication flaw in the Amazon Web Services cloud computing platform that could permit customer account compromise.
Assessing what level of risk is acceptable to one's business is key to any move to the cloud, says Siobhan Byron, president of Forsythe Technology Canada.
Before seeking out help from vendors in dealing with the advanced persistent threat, security professionals must understand exactly what defines such an attack.
Protecting data in the cloud is a shared sacrifice for end-users and providers, but understanding who needs to do what can sometimes be tricky.
A Maryland real estate company streamlined its operations by moving email and other operations to the cloud, But that wasn't the only benefit: The migration also helped the business better protect its data.
Amazon's Simple Storage Service (S3) is being used to host malicious sites distributing the nefarious banking trojan.
The Cloud Security Alliance is planning to develop and maintain a public registry documenting the security controls that exist in various cloud computing offerings.
Clouds are, by definition, insubstantial, but when services "somewhere out there" go pear-shaped, the damage can be catastrophic.
Vivek Kundra, the nation's first chief information officer, announced that he plans to step down later this summer to take a position at Harvard University.
With more organizations hesitant to entrust their sensitive data to the cloud and a handful of high-profile breaches, providers are augmenting their protections capabilities.
A bill recently introduced in the U.S. Senate would update a 25-year-old digital privacy law to require authorities to obtain a court-issued search warrant before retrieving a person's email and other content stored in the cloud.
Amazon's outage should serve as a reminder that relying on the cloud for server space can have a business impact if something goes amiss.
Sign up to our newsletters
SC Magazine Articles
- U.S., China agree to cybersecurity code of conduct
- APT group exploits Adobe Flash Player zero-day in phishing operation
- Dridex banking malware spreading through new spam campaign
- Targeted attacks rise, cyber attackers spreading through networks, report says
- COA Network breached, all customer data treated as potentially compromised
- 'MEDJACK' tactic allows cyber criminals to enter healthcare networks undetected
- Samsung devices, including Galaxy S6, vulnerable to remote code execution
- Study: Organizations taking months to remediate vulnerabilities
- U.S., China agree to cybersecurity code of conduct
- Suspicious activity on LastPass network, data compromised