Cloud

Deciphering cloud strategy

Deciphering cloud strategy By

There are steps security pros can take to achieve greater peace of mind with cloud implementations, reports Alan Earls.

Decoding the cloud

Decoding the cloud

Unfortunately, data security and regulatory compliance requirements do not evaporate in the public cloud, says Vormetric's Ashvin Kamaraju.

Report: Among simple, yet effective web app attacks, cloud environments hit hardest

By

A security firm found that more than half of survey respondents were impacted by web application attacks.

Apple releases two-factor authentication

Apple releases two-factor authentication By

Apple ID and iCloud users will now have the option to use the security feature for purchases or account changes.

PCI compliance in the cloud decoded

PCI compliance in the cloud decoded

As interest in the public cloud remains strong, a security expert makes sense of new recommendations for securing payment card data in those environments.

RSA 2013: Know thy third-party vendor to avoid the surprise of a breach

By

Entrusting sensitive data to third-parties is a part of doing business, but that doesn't mean organizations should be blindsided by breaches.

Study finds that growth of security workers is needed, though budget constraints remain a hurdle

By

Robust growth in the information security profession is a sign of economic health in the overall economy, according to a new report from (ISC)2. And personnel skilled in emerging technologies and security as a business will be the ones who excel.

Identity crisis: From the data center into the cloud

I was surprised when one of our new employees several months ago described how a state agency enabled IT support personnel to easily maintain an after-hours "on call" list.

PCI council clarifies merchant's cloud security obligations

By

The Payment Card Industry Security Standards Council (PCI SSC) released recommendations for card data security and compliance in cloud environments.

The cloud will shake markets

The cloud will shake markets

The data center business model must evolve with cloud's demands, says NJVC's Kevin Jackson.

A continuing evolution in vulnerability assessment

A continuing evolution in vulnerability assessment By

The two big areas of growth in this year's vulnerability assessment products were cloud-based assessments and increased automation and templates.

It's 10 a.m. at the other end of the world. Do you know where your cloud data is?

The era of "just trust us" as far as your cloud security goes is effectively over.

Cloud of suspicion

Cloud of suspicion

Cloud computing still is trying to overcome the trust and reliability issues that has made it a questionable proposition for many organizations.

Prediction: BYOD may go away in 2013

Prediction: BYOD may go away in 2013

With a new year come new challenges. But while many see bring-your-own-device gaining momentum, more organizations may be ready to issue their own handhelds to employees.

Expect attackers to up their creativity game in 2013

Expect attackers to up their creativity game in 2013

From mobile devices to the cloud to the supply chain and beyond, next year is certain to bring with it fresh set of information security challenges.

Video: Building security into the cloud

By

Dan Kaplan, executive editor of SC Magazine, sits with Urvish Vashi, vice president of marketing at Alert Logic, to discuss recent developments in cloud security.

Storms ahead: Insiders and the cloud

Storms ahead: Insiders and the cloud By

Most organizations cite trust issues as their primary reason for deciding against outsourcing their computing resources and data assets. So just what are cloud providers doing to ensure protection?

Microsoft asks: Are you cloud ready?

By

Microsoft on Tuesday announced the release of a survey that organizations can use to gauge their capability to migrate to the cloud.

The challenges of securing enterprises in a BYOD world

The challenges of securing enterprises in a BYOD world

Companies are permitting BYOD even if they have policies against it. But a set of best practices, covering areas such as IT inventory and device detection, can mitigate many of the corresponding risks.

A public cloud conundrum

A public cloud conundrum

We must resolve issues around data sovereignty, says Capgemini's Joe Coyle.

Authenticating new tech: Safeguarding mobile identities

Authenticating new tech: Safeguarding mobile identities

In the age of mobile, social and cloud, the so-called perimeter that businesses have been protecting for years is now dead.

Cloud security

Cloud security

More and more enterprises are embracing cloud computing, both through service agreements and private development, to gain greater efficiencies and better scalability in tough economic times.

Staying current: Merit Medical Systems and Symplified

Staying current: Merit Medical Systems and Symplified By

The apps used on mobile devices connected to its network contained sensitive data, so a medical device manufacturer needed to ensure that access control and authorization policies were enforced.

Sponsored Video: Philippe Courtot, chairman and CEO, Qualys

By

SC Magazine catches up with Qualys chairman and CEO, Philippe Courtot, at this year's Black Hat conference in Las Vegas to discuss the challenges industry professionals face today.

Dropbox investigation possible email address breach

By

Dropbox has brought in outside security experts to investigate what could be a possible email address leak after users complained of unwanted mail flooding their inboxes.

Cyber security market to reach $120B by 2017

By

Driven by increasing use of cloud and mobile services, and cyber criminal activity from hacktivists, terrorist groups, nation-state actors and those out for financial gain, the global cyber security market is expected to grow by 11.3 percent each year.

Hypervisor vs. host-based security: How do they compare?

Hypervisor vs. host-based security: How do they compare?

With more organizations opting for hybrid cloud deployments, they will have to be decide whether hypervisor- or host-based security is the best method to monitor for intrusions.

Sponsored Video: Julian Lovelock, VP of product marketing, ActivIdentity

By

ActivIdentity's Julian Lovelock discusses challenges in the IT security world today with Dan Kaplan, executive editor of SC Magazine, in this insightful In Focus video.

Exotic, new connections: Embedded devices

Exotic, new connections: Embedded devices By

For a while, only traditional PCs were connected to the public internet. But with most devices now gaining networked capabilities, it's only a matter of time before your television can contract a virus.

A room of her own: Philips Electronics North America and Wisegate

A room of her own: Philips Electronics North America and Wisegate By

A privacy officer at a global company found a way to collaborate efficiently at a top level, while ensuring the protection of company assets, reports Greg Masters.

Advertisement

How to Prevent Insider Threats!

POLL