April 01, 2013
There are steps security pros can take to achieve greater peace of mind with cloud implementations, reports Alan Earls.
April 01, 2013
Unfortunately, data security and regulatory compliance requirements do not evaporate in the public cloud, says Vormetric's Ashvin Kamaraju.
A security firm found that more than half of survey respondents were impacted by web application attacks.
Apple ID and iCloud users will now have the option to use the security feature for purchases or account changes.
March 15, 2013
As interest in the public cloud remains strong, a security expert makes sense of new recommendations for securing payment card data in those environments.
Entrusting sensitive data to third-parties is a part of doing business, but that doesn't mean organizations should be blindsided by breaches.
Robust growth in the information security profession is a sign of economic health in the overall economy, according to a new report from (ISC)2. And personnel skilled in emerging technologies and security as a business will be the ones who excel.
I was surprised when one of our new employees several months ago described how a state agency enabled IT support personnel to easily maintain an after-hours "on call" list.
The Payment Card Industry Security Standards Council (PCI SSC) released recommendations for card data security and compliance in cloud environments.
February 01, 2013
The data center business model must evolve with cloud's demands, says NJVC's Kevin Jackson.
February 01, 2013
The two big areas of growth in this year's vulnerability assessment products were cloud-based assessments and increased automation and templates.
The era of "just trust us" as far as your cloud security goes is effectively over.
January 02, 2013
Cloud computing still is trying to overcome the trust and reliability issues that has made it a questionable proposition for many organizations.
December 17, 2012
With a new year come new challenges. But while many see bring-your-own-device gaining momentum, more organizations may be ready to issue their own handhelds to employees.
November 30, 2012
From mobile devices to the cloud to the supply chain and beyond, next year is certain to bring with it fresh set of information security challenges.
Dan Kaplan, executive editor of SC Magazine, sits with Urvish Vashi, vice president of marketing at Alert Logic, to discuss recent developments in cloud security.
November 01, 2012
Most organizations cite trust issues as their primary reason for deciding against outsourcing their computing resources and data assets. So just what are cloud providers doing to ensure protection?
Microsoft on Tuesday announced the release of a survey that organizations can use to gauge their capability to migrate to the cloud.
October 08, 2012
Companies are permitting BYOD even if they have policies against it. But a set of best practices, covering areas such as IT inventory and device detection, can mitigate many of the corresponding risks.
October 01, 2012
We must resolve issues around data sovereignty, says Capgemini's Joe Coyle.
October 01, 2012
In the age of mobile, social and cloud, the so-called perimeter that businesses have been protecting for years is now dead.
August 12, 2012
More and more enterprises are embracing cloud computing, both through service agreements and private development, to gain greater efficiencies and better scalability in tough economic times.
August 01, 2012
The apps used on mobile devices connected to its network contained sensitive data, so a medical device manufacturer needed to ensure that access control and authorization policies were enforced.
SC Magazine catches up with Qualys chairman and CEO, Philippe Courtot, at this year's Black Hat conference in Las Vegas to discuss the challenges industry professionals face today.
Dropbox has brought in outside security experts to investigate what could be a possible email address leak after users complained of unwanted mail flooding their inboxes.
Driven by increasing use of cloud and mobile services, and cyber criminal activity from hacktivists, terrorist groups, nation-state actors and those out for financial gain, the global cyber security market is expected to grow by 11.3 percent each year.
June 20, 2012
With more organizations opting for hybrid cloud deployments, they will have to be decide whether hypervisor- or host-based security is the best method to monitor for intrusions.
ActivIdentity's Julian Lovelock discusses challenges in the IT security world today with Dan Kaplan, executive editor of SC Magazine, in this insightful In Focus video.
May 01, 2012
For a while, only traditional PCs were connected to the public internet. But with most devices now gaining networked capabilities, it's only a matter of time before your television can contract a virus.
April 05, 2012
A privacy officer at a global company found a way to collaborate efficiently at a top level, while ensuring the protection of company assets, reports Greg Masters.