At the upcoming 2013 SC Awards US, Porticor hopes to take home the Best Cloud Computing Security award.
Both companies strengthened identity verification policies for customers after a tech writer's online accounts were hacked.
Authenticating to a SaaS application in the cloud should be simple. It now Is.
Many of today's applications are designed to work over any port, which increases chances they won't be blocked by firewalls.
Cisco has acquired Milpitas, Calif.-based Virtuata, a security software start-up that safeguards virtual machine data, for an undisclosed sum.
Driven by increasing use of cloud and mobile services, and cyber criminal activity from hacktivists, terrorist groups, nation-state actors and those out for financial gain, the global cyber security market is expected to grow by 11.3 percent each year.
It's not just data that is at risk with a mobile workforce, it's the whole shebang: data, applications, operating environments and, we hope, security.
Small and midsize businesses will continue implementing cloud services, perhaps jumping to a quarter of all security spending by 2016, according to a soon-to-be-released report.
With more organizations opting for hybrid cloud deployments, they will have to be decide whether hypervisor- or host-based security is the best method to monitor for intrusions.
With emerging technologies that must be controlled, the demand to align business risk with security is growing. As such, the IT role is being reinvented under our feet, and those who function more like a CIO will rule the world.
While it has revolutionized collaboration, the cloud can also bring with it potentially serious security ramifications, like intellectual property theft or data breaches.
A move to the cloud means spending less on managing security for small to midsize companies, says a new report.
The decision to move to the cloud has always been wrought with anxiety over entrusting one's data to a third-party. Learning which questions to ask of a provider can help mitigate that concern.
software developers with skills in collaboration software, databases and mobile device programming are needed.
Risks exist in the e-discovery process, as sensitive information frequently moves and is stored outside a company's firewall.
Be wary of vendor messaging in light of today's threats, as it may be misguided. Organizations can cope with the latest concerns by applying tried-and-true security best practices.
Given the cost benefits, security pros likely can do little to stop their organization from migrating to the cloud. That's why they must do all they can to control the risk.
Nobody would leave their car unlocked in a public parking lot...so why is it so many are leaving the servers unlocked in the cloud?
When Apple announced iCloud at its Worldwide Developers Conference last June, it set acolytes abuzz with anticipation.
Throughout the day, SC Magazine will be announcing the finalists from each of its 32 award categories, covering the Reader Trust, Professional and Excellence sections.
Researchers have uncovered a now-fixed authentication flaw in the Amazon Web Services cloud computing platform that could permit customer account compromise.
Assessing what level of risk is acceptable to one's business is key to any move to the cloud, says Siobhan Byron, president of Forsythe Technology Canada.
Before seeking out help from vendors in dealing with the advanced persistent threat, security professionals must understand exactly what defines such an attack.
Protecting data in the cloud is a shared sacrifice for end-users and providers, but understanding who needs to do what can sometimes be tricky.
A Maryland real estate company streamlined its operations by moving email and other operations to the cloud, But that wasn't the only benefit: The migration also helped the business better protect its data.
Amazon's Simple Storage Service (S3) is being used to host malicious sites distributing the nefarious banking trojan.
The Cloud Security Alliance is planning to develop and maintain a public registry documenting the security controls that exist in various cloud computing offerings.
Clouds are, by definition, insubstantial, but when services "somewhere out there" go pear-shaped, the damage can be catastrophic.
Vivek Kundra, the nation's first chief information officer, announced that he plans to step down later this summer to take a position at Harvard University.
With more organizations hesitant to entrust their sensitive data to the cloud and a handful of high-profile breaches, providers are augmenting their protections capabilities.