Psychological acceptability may not sound like a term that'll hold much significance for the future of secure file sharing, but don't sell it short.
To avoid damage from staff using social media, a radio network made certain its cloud was defended. Greg Masters reports.
Critical datacenter assets are at the heart of financial services (and many other industries) enterprise networks. Unfortunately, it's still too easy for attackers to get into the datacenter through an insider, a partner, a side server, virtualization, or even a development environment.
Moving enterprise apps to the cloud is becoming a very attractive option for organizations striving to cut IT costs while improving agility and scalability.
Just recently we witnessed the U.S. House of Representative pass two bills aimed at bolstering the security operations of the nation's critical infrastructure.
Apple's CEO said the company will begin using email and push notifications to alert users to passwords changes in any iCloud account.
Revelations of government surveillance are fueling a paranoia that isn't going to subside. Kate O'Flaherty asks whether firms should be afraid of adopting cloud?
Nation-states are flexing their muscles in the cyber realm, says Avatier's Ryan Ward.
Now is the time for infosec pros to embrace CHAOS and protect organizations from the realities of our always-on world.
Experts debate whether data in the cloud is more secure than data that's housed on an organization's premises.
In a study, HP Fortify tested 10 popular Internet of Things (IoT) devices, including TVs, webcams and device control hubs.
Today, updated versions of the Cloud Controls Matrix and Consensus Assessments Initiatives Questionnaire hit the web.
NIST presents 65 challenges of cloud computing divided into nine categories in an effort to build consensus and formulate solutions.
Infrastructure cloud computing presents a plethora of challenges that are derived from the company's cloud resources.
In the world of information security, naturally, security is of paramount importance, but control is king.
For the first time, the report shows how often providers encrypt communications coming to and from Gmail.
Surveys conducted at the RSA Conference revealed that many can still access former employers' systems and most eschewed the cloud for sensitive data.
On Wednesday, Yahoo's CISO Alex Stamos announced the security measures.
Growth businesses are always looking for flexible ways of working that reduce capital and running costs, while securely delivering the data users need, when and where they need it.
Of the respondents participating in a just released survey, 33 percent indicated that they are less likely to adopt the cloud due to fears of government surveillance.
Enterprises are still not being proactive enough in securing the data they have in the cloud, according to a recent study.
The Canadian government has hired Wedge Networks, a provider of cloud-based security services, to secure its computing infrastructure.
Cloud computing is becoming a reality that will need to be addressed by every security department.
Baltimore-based RedOwl Analytics was named "Most Innovative Company" at the RSA Conference 2014 Innovation Sandbox event.
The tools that organizations have relied on to protect their networks are antiquated and no longer work.
While agility, availability and lower TCO will drive business to the cloud, organizations must address open questions around the security and compliance of PHI, PII, and who has access to it.
In order to unlock the floodgates, we need to address the security concerns of moving everything to the cloud. Fortunately, cloud providers today are heavily invested in addressing this issue.
While cloud vendors vie for dominance in attracting customers with their promises of data access anywhere, and better security than a company might be able to provide for itself, the bottom line is that client companies are responsible for their data, regardless of where it resides.
The cloud offers reliability, cost savings and convenience, but protecting it requires modern-day defenses, reports Jim Romeo.
Will 2013 be remembered as the year that DevOps accelerated into the IT mainstream or became just another trend that died in the "hype cycle"?
Sign up to our newsletters
SC Magazine Articles
- Anonymous hacks, 'Rickrolls' ISIS
- IBM, Oracle, Cisco certification manager breached, info accessed
- Hilton Worldwide confirms malware on POS targeted payment card info
- Algebraic Eraser, the algorithm running the 'Internet of Things' is broken...again
- Sony hackers remained hidden for months due to a new toolset: Damballa