Cloud Computing

Porticor for Best Cloud Computing Security

Porticor for Best Cloud Computing Security

At the upcoming 2013 SC Awards US, Porticor hopes to take home the Best Cloud Computing Security award.

Apple, Amazon respond to reporter's hacking nightmare

By

Both companies strengthened identity verification policies for customers after a tech writer's online accounts were hacked.

Needed: Better app control

Needed: Better app control

Many of today's applications are designed to work over any port, which increases chances they won't be blocked by firewalls.

Ping Identity

Ping Identity

By

Authenticating to a SaaS application in the cloud should be simple. It now Is.

Cisco buys Virtuata for virtual security

By

Cisco has acquired Milpitas, Calif.-based Virtuata, a security software start-up that safeguards virtual machine data, for an undisclosed sum.

Cyber security market to reach $120B by 2017

By

Driven by increasing use of cloud and mobile services, and cyber criminal activity from hacktivists, terrorist groups, nation-state actors and those out for financial gain, the global cyber security market is expected to grow by 11.3 percent each year.

Computer in your pocket

Computer in your pocket

By

It's not just data that is at risk with a mobile workforce, it's the whole shebang: data, applications, operating environments and, we hope, security.

SMB cloud security spending to continue growth

Small and midsize businesses will continue implementing cloud services, perhaps jumping to a quarter of all security spending by 2016, according to a soon-to-be-released report.

The IT staff of the future will speak business, not just technology

The IT staff of the future will speak business, not just technology

With emerging technologies that must be controlled, the demand to align business risk with security is growing. As such, the IT role is being reinvented under our feet, and those who function more like a CIO will rule the world.

The unforeseen risks of the cloud

The unforeseen risks of the cloud

While it has revolutionized collaboration, the cloud can also bring with it potentially serious security ramifications, like intellectual property theft or data breaches.

A smarter migration: Cloud computing

A smarter migration: Cloud computing

By

The decision to move to the cloud has always been wrought with anxiety over entrusting one's data to a third-party. Learning which questions to ask of a provider can help mitigate that concern.

The new e-discovery playing field

The new e-discovery playing field

Risks exist in the e-discovery process, as sensitive information frequently moves and is stored outside a company's firewall.

Are security basics getting lost under the cover of cloud and mobile?

Are security basics getting lost under the cover of cloud and mobile?

Be wary of vendor messaging in light of today's threats, as it may be misguided. Organizations can cope with the latest concerns by applying tried-and-true security best practices.

RSA Conference 2012: Embrace, don't fear, the cloud

By

Given the cost benefits, security pros likely can do little to stop their organization from migrating to the cloud. That's why they must do all they can to control the risk.

Offering security services benefits cloud deployments

Nobody would leave their car unlocked in a public parking lot...so why is it so many are leaving the servers unlocked in the cloud?

iCloud and enterprise IT

iCloud and enterprise IT

When Apple announced iCloud at its Worldwide Developers Conference last June, it set acolytes abuzz with anticipation.

Best Cloud Computing Security & Best Computer Forensics Tool

By

Throughout the day, SC Magazine will be announcing the finalists from each of its 32 award categories, covering the Reader Trust, Professional and Excellence sections.

German researchers disclose Amazon cloud vulnerability

Researchers have uncovered a now-fixed authentication flaw in the Amazon Web Services cloud computing platform that could permit customer account compromise.

Cloud: A risk/reward proposition

Cloud: A risk/reward proposition

Assessing what level of risk is acceptable to one's business is key to any move to the cloud, says Siobhan Byron, president of Forsythe Technology Canada.

Advanced persistent threats call for a reality check

Advanced persistent threats call for a reality check

Before seeking out help from vendors in dealing with the advanced persistent threat, security professionals must understand exactly what defines such an attack.

No pointing fingers: Defense in the cloud is everyone's responsibility

No pointing fingers: Defense in the cloud is everyone's responsibility

Protecting data in the cloud is a shared sacrifice for end-users and providers, but understanding who needs to do what can sometimes be tricky.

Planet cloud: Keys2Day Real Estate Team and InfoStreet

Planet cloud: Keys2Day Real Estate Team and InfoStreet

By

A Maryland real estate company streamlined its operations by moving email and other operations to the cloud, But that wasn't the only benefit: The migration also helped the business better protect its data.

Criminals abusing Amazon cloud to spread SpyEye

By

Amazon's Simple Storage Service (S3) is being used to host malicious sites distributing the nefarious banking trojan.

Nonprofit will publish how providers secure cloud

By

The Cloud Security Alliance is planning to develop and maintain a public registry documenting the security controls that exist in various cloud computing offerings.

Cloudy with spells of pain

Clouds are, by definition, insubstantial, but when services "somewhere out there" go pear-shaped, the damage can be catastrophic.

Federal CIO Vivek Kundra steps down for Harvard post

By

Vivek Kundra, the nation's first chief information officer, announced that he plans to step down later this summer to take a position at Harvard University.

Safety in the cloud: Cloud-based services

Safety in the cloud: Cloud-based services

By

With more organizations hesitant to entrust their sensitive data to the cloud and a handful of high-profile breaches, providers are augmenting their protections capabilities.

Proposed legislation would reform digital privacy law

By

A bill recently introduced in the U.S. Senate would update a 25-year-old digital privacy law to require authorities to obtain a court-issued search warrant before retrieving a person's email and other content stored in the cloud.

Amazon cloud failure highlights customer responsibility

By

Amazon's outage should serve as a reminder that relying on the cloud for server space can have a business impact if something goes amiss.

Skills in demand: Cloud technologies

Skills in demand: Cloud technologies

Cloud/security knowledge is in demand within such professions as network engineer, solutions architect, sales engineers and sales manager.

Sign up to our newsletters

POLL