Cloud Computing

Porticor for Best Cloud Computing Security

Porticor for Best Cloud Computing Security

At the upcoming 2013 SC Awards US, Porticor hopes to take home the Best Cloud Computing Security award.

Apple, Amazon respond to reporter's hacking nightmare

By

Both companies strengthened identity verification policies for customers after a tech writer's online accounts were hacked.

Ping Identity

Ping Identity

By

Authenticating to a SaaS application in the cloud should be simple. It now Is.

Needed: Better app control

Needed: Better app control

Many of today's applications are designed to work over any port, which increases chances they won't be blocked by firewalls.

Cisco buys Virtuata for virtual security

By

Cisco has acquired Milpitas, Calif.-based Virtuata, a security software start-up that safeguards virtual machine data, for an undisclosed sum.

Cyber security market to reach $120B by 2017

By

Driven by increasing use of cloud and mobile services, and cyber criminal activity from hacktivists, terrorist groups, nation-state actors and those out for financial gain, the global cyber security market is expected to grow by 11.3 percent each year.

Computer in your pocket

Computer in your pocket

By

It's not just data that is at risk with a mobile workforce, it's the whole shebang: data, applications, operating environments and, we hope, security.

SMB cloud security spending to continue growth

Small and midsize businesses will continue implementing cloud services, perhaps jumping to a quarter of all security spending by 2016, according to a soon-to-be-released report.

Hypervisor vs. host-based security: How do they compare?

Hypervisor vs. host-based security: How do they compare?

With more organizations opting for hybrid cloud deployments, they will have to be decide whether hypervisor- or host-based security is the best method to monitor for intrusions.

The IT staff of the future will speak business, not just technology

The IT staff of the future will speak business, not just technology

With emerging technologies that must be controlled, the demand to align business risk with security is growing. As such, the IT role is being reinvented under our feet, and those who function more like a CIO will rule the world.

The unforeseen risks of the cloud

The unforeseen risks of the cloud

While it has revolutionized collaboration, the cloud can also bring with it potentially serious security ramifications, like intellectual property theft or data breaches.

Pros of managing security in cloud make it attractive

By

A move to the cloud means spending less on managing security for small to midsize companies, says a new report.

A smarter migration: Cloud computing

A smarter migration: Cloud computing

By

The decision to move to the cloud has always been wrought with anxiety over entrusting one's data to a third-party. Learning which questions to ask of a provider can help mitigate that concern.

Skills in demand: Database and mobile device programming

Skills in demand: Database and mobile device programming

software developers with skills in collaboration software, databases and mobile device programming are needed.

The new e-discovery playing field

The new e-discovery playing field

Risks exist in the e-discovery process, as sensitive information frequently moves and is stored outside a company's firewall.

Are security basics getting lost under the cover of cloud and mobile?

Are security basics getting lost under the cover of cloud and mobile?

Be wary of vendor messaging in light of today's threats, as it may be misguided. Organizations can cope with the latest concerns by applying tried-and-true security best practices.

RSA Conference 2012: Embrace, don't fear, the cloud

By

Given the cost benefits, security pros likely can do little to stop their organization from migrating to the cloud. That's why they must do all they can to control the risk.

Offering security services benefits cloud deployments

Nobody would leave their car unlocked in a public parking lot...so why is it so many are leaving the servers unlocked in the cloud?

iCloud and enterprise IT

iCloud and enterprise IT

When Apple announced iCloud at its Worldwide Developers Conference last June, it set acolytes abuzz with anticipation.

Best Cloud Computing Security & Best Computer Forensics Tool

By

Throughout the day, SC Magazine will be announcing the finalists from each of its 32 award categories, covering the Reader Trust, Professional and Excellence sections.

German researchers disclose Amazon cloud vulnerability

Researchers have uncovered a now-fixed authentication flaw in the Amazon Web Services cloud computing platform that could permit customer account compromise.

Cloud: A risk/reward proposition

Cloud: A risk/reward proposition

Assessing what level of risk is acceptable to one's business is key to any move to the cloud, says Siobhan Byron, president of Forsythe Technology Canada.

Advanced persistent threats call for a reality check

Advanced persistent threats call for a reality check

Before seeking out help from vendors in dealing with the advanced persistent threat, security professionals must understand exactly what defines such an attack.

No pointing fingers: Defense in the cloud is everyone's responsibility

No pointing fingers: Defense in the cloud is everyone's responsibility

Protecting data in the cloud is a shared sacrifice for end-users and providers, but understanding who needs to do what can sometimes be tricky.

Planet cloud: Keys2Day Real Estate Team and InfoStreet

Planet cloud: Keys2Day Real Estate Team and InfoStreet

By

A Maryland real estate company streamlined its operations by moving email and other operations to the cloud, But that wasn't the only benefit: The migration also helped the business better protect its data.

Criminals abusing Amazon cloud to spread SpyEye

By

Amazon's Simple Storage Service (S3) is being used to host malicious sites distributing the nefarious banking trojan.

Nonprofit will publish how providers secure cloud

By

The Cloud Security Alliance is planning to develop and maintain a public registry documenting the security controls that exist in various cloud computing offerings.

Cloudy with spells of pain

Clouds are, by definition, insubstantial, but when services "somewhere out there" go pear-shaped, the damage can be catastrophic.

Federal CIO Vivek Kundra steps down for Harvard post

By

Vivek Kundra, the nation's first chief information officer, announced that he plans to step down later this summer to take a position at Harvard University.

Safety in the cloud: Cloud-based services

Safety in the cloud: Cloud-based services

By

With more organizations hesitant to entrust their sensitive data to the cloud and a handful of high-profile breaches, providers are augmenting their protections capabilities.

Sign up to our newsletters

POLL