Cloud computing is becoming a reality that will need to be addressed by every security department.
Baltimore-based RedOwl Analytics was named "Most Innovative Company" at the RSA Conference 2014 Innovation Sandbox event.
The tools that organizations have relied on to protect their networks are antiquated and no longer work.
While agility, availability and lower TCO will drive business to the cloud, organizations must address open questions around the security and compliance of PHI, PII, and who has access to it.
In order to unlock the floodgates, we need to address the security concerns of moving everything to the cloud. Fortunately, cloud providers today are heavily invested in addressing this issue.
While cloud vendors vie for dominance in attracting customers with their promises of data access anywhere, and better security than a company might be able to provide for itself, the bottom line is that client companies are responsible for their data, regardless of where it resides.
The cloud offers reliability, cost savings and convenience, but protecting it requires modern-day defenses, reports Jim Romeo.
Will 2013 be remembered as the year that DevOps accelerated into the IT mainstream or became just another trend that died in the "hype cycle"?
I'm not a big predictions guy. I don't own a crystal ball, though I have been known to ask questions of my daughter's "Magic 8-Ball" on occasion. When it comes to enterprise IT, however, I do have some strong opinions about what 2014 will bring.
When we talk about the cloud, we need to realize that the concept of the cloud is a business, not a technical, construct.
In this video, David Campbell, founder and CEO of JumpCloud, discusses security in the cloud when it comes to small to medium sized enterprises.
Why does the lure of the cloud tempt businesses to put ever more sensitive data at risk? Richard Moulds, VP of strategy at Thales e-Security examines the situation.
Starting in early January, Yahoo Mail will be protected by SSL encryption by default.
Obstacles still remain before companies can safeguard assets in the cloud, but software advances are helping, reports David Cotriss.
Cloud providers must be evaluated before moving operations, says the DTCC's Mark Clancy.
The tech giant argued that a ruling could have troubling legal implications on "ordinary activities" where unencrypted Wi-Fi traffic is intercepted.
Companies who leverage the cloud have concerns over the security of their data. The migration has increased demand for incident response pros, including reverse engineers and malware analysts.
It used to be that organizations were concerned about migrating their data to the cloud out of fear of hackers or disgruntled insiders. But Edward Snowden's NSA leaks show there's a new threat actor: the government. Encryption can help.
The deal to purchase Trusteer is rumored to be near $1 billion.
Organizations that already may have feared entrusting their data to a cloud provider out of security and privacy concerns now face new apprehensions in light of NSA spying, the Cloud Security Alliance documented in a study.
More than 3,000 patients at an Oregon hospital were notified of their information being stored in an unauthorized cloud service.
Cisco made a big network security splash on Tuesday with news that it will purchase Sourcefire, best known for its open-source intrusion prevention system Snort, for $2.7 billion.
The bug was quietly patched by Google last month.
Cloud computing services and social networks are pushing data to external networks, but mobile devices are circumventing corporate networks entirely.
More and more enterprises are embracing cloud computing to gain greater efficiencies and better scalability in tough economic times.
Companies are increasingly incorporating cloud technologies to enhance business in the global market. This has increased demand for cloud security engineers to manage the advanced network security architecture.
The ten-fold increase in savings carries a hundred-fold increase in risk concentration. That's why savvy CIOs are making it the centerpiece of their security strategy, and the industry needs to follow suit.
Identity and access management (IAM) can be the missing link between effective security and keeping the cloud agile.
There are steps security pros can take to achieve greater peace of mind with cloud implementations, reports Alan Earls.
Unfortunately, data security and regulatory compliance requirements do not evaporate in the public cloud, says Vormetric's Ashvin Kamaraju.