I'm not a big predictions guy. I don't own a crystal ball, though I have been known to ask questions of my daughter's "Magic 8-Ball" on occasion. When it comes to enterprise IT, however, I do have some strong opinions about what 2014 will bring.
When we talk about the cloud, we need to realize that the concept of the cloud is a business, not a technical, construct.
In this video, David Campbell, founder and CEO of JumpCloud, discusses security in the cloud when it comes to small to medium sized enterprises.
Why does the lure of the cloud tempt businesses to put ever more sensitive data at risk? Richard Moulds, VP of strategy at Thales e-Security examines the situation.
Starting in early January, Yahoo Mail will be protected by SSL encryption by default.
Obstacles still remain before companies can safeguard assets in the cloud, but software advances are helping, reports David Cotriss.
Cloud providers must be evaluated before moving operations, says the DTCC's Mark Clancy.
The tech giant argued that a ruling could have troubling legal implications on "ordinary activities" where unencrypted Wi-Fi traffic is intercepted.
Companies who leverage the cloud have concerns over the security of their data. The migration has increased demand for incident response pros, including reverse engineers and malware analysts.
It used to be that organizations were concerned about migrating their data to the cloud out of fear of hackers or disgruntled insiders. But Edward Snowden's NSA leaks show there's a new threat actor: the government. Encryption can help.
The deal to purchase Trusteer is rumored to be near $1 billion.
Organizations that already may have feared entrusting their data to a cloud provider out of security and privacy concerns now face new apprehensions in light of NSA spying, the Cloud Security Alliance documented in a study.
More than 3,000 patients at an Oregon hospital were notified of their information being stored in an unauthorized cloud service.
Cisco made a big network security splash on Tuesday with news that it will purchase Sourcefire, best known for its open-source intrusion prevention system Snort, for $2.7 billion.
The bug was quietly patched by Google last month.
Cloud computing services and social networks are pushing data to external networks, but mobile devices are circumventing corporate networks entirely.
More and more enterprises are embracing cloud computing to gain greater efficiencies and better scalability in tough economic times.
Companies are increasingly incorporating cloud technologies to enhance business in the global market. This has increased demand for cloud security engineers to manage the advanced network security architecture.
The ten-fold increase in savings carries a hundred-fold increase in risk concentration. That's why savvy CIOs are making it the centerpiece of their security strategy, and the industry needs to follow suit.
Identity and access management (IAM) can be the missing link between effective security and keeping the cloud agile.
There are steps security pros can take to achieve greater peace of mind with cloud implementations, reports Alan Earls.
Unfortunately, data security and regulatory compliance requirements do not evaporate in the public cloud, says Vormetric's Ashvin Kamaraju.
A security firm found that more than half of survey respondents were impacted by web application attacks.
Apple ID and iCloud users will now have the option to use the security feature for purchases or account changes.
As interest in the public cloud remains strong, a security expert makes sense of new recommendations for securing payment card data in those environments.
Entrusting sensitive data to third-parties is a part of doing business, but that doesn't mean organizations should be blindsided by breaches.
Robust growth in the information security profession is a sign of economic health in the overall economy, according to a new report from (ISC)2. And personnel skilled in emerging technologies and security as a business will be the ones who excel.
I was surprised when one of our new employees several months ago described how a state agency enabled IT support personnel to easily maintain an after-hours "on call" list.
The Payment Card Industry Security Standards Council (PCI SSC) released recommendations for card data security and compliance in cloud environments.
The data center business model must evolve with cloud's demands, says NJVC's Kevin Jackson.