There are steps security pros can take to achieve greater peace of mind with cloud implementations, reports Alan Earls.
Unfortunately, data security and regulatory compliance requirements do not evaporate in the public cloud, says Vormetric's Ashvin Kamaraju.
A security firm found that more than half of survey respondents were impacted by web application attacks.
Apple ID and iCloud users will now have the option to use the security feature for purchases or account changes.
As interest in the public cloud remains strong, a security expert makes sense of new recommendations for securing payment card data in those environments.
Entrusting sensitive data to third-parties is a part of doing business, but that doesn't mean organizations should be blindsided by breaches.
Robust growth in the information security profession is a sign of economic health in the overall economy, according to a new report from (ISC)2. And personnel skilled in emerging technologies and security as a business will be the ones who excel.
I was surprised when one of our new employees several months ago described how a state agency enabled IT support personnel to easily maintain an after-hours "on call" list.
The Payment Card Industry Security Standards Council (PCI SSC) released recommendations for card data security and compliance in cloud environments.
The data center business model must evolve with cloud's demands, says NJVC's Kevin Jackson.
The two big areas of growth in this year's vulnerability assessment products were cloud-based assessments and increased automation and templates.
The era of "just trust us" as far as your cloud security goes is effectively over.
Cloud computing still is trying to overcome the trust and reliability issues that has made it a questionable proposition for many organizations.
With a new year come new challenges. But while many see bring-your-own-device gaining momentum, more organizations may be ready to issue their own handhelds to employees.
From mobile devices to the cloud to the supply chain and beyond, next year is certain to bring with it fresh set of information security challenges.
Dan Kaplan, executive editor of SC Magazine, sits with Urvish Vashi, vice president of marketing at Alert Logic, to discuss recent developments in cloud security.
Most organizations cite trust issues as their primary reason for deciding against outsourcing their computing resources and data assets. So just what are cloud providers doing to ensure protection?
Microsoft on Tuesday announced the release of a survey that organizations can use to gauge their capability to migrate to the cloud.
Companies are permitting BYOD even if they have policies against it. But a set of best practices, covering areas such as IT inventory and device detection, can mitigate many of the corresponding risks.
We must resolve issues around data sovereignty, says Capgemini's Joe Coyle.
In the age of mobile, social and cloud, the so-called perimeter that businesses have been protecting for years is now dead.
More and more enterprises are embracing cloud computing, both through service agreements and private development, to gain greater efficiencies and better scalability in tough economic times.
The apps used on mobile devices connected to its network contained sensitive data, so a medical device manufacturer needed to ensure that access control and authorization policies were enforced.
SC Magazine catches up with Qualys chairman and CEO, Philippe Courtot, at this year's Black Hat conference in Las Vegas to discuss the challenges industry professionals face today.
Dropbox has brought in outside security experts to investigate what could be a possible email address leak after users complained of unwanted mail flooding their inboxes.
Driven by increasing use of cloud and mobile services, and cyber criminal activity from hacktivists, terrorist groups, nation-state actors and those out for financial gain, the global cyber security market is expected to grow by 11.3 percent each year.
With more organizations opting for hybrid cloud deployments, they will have to be decide whether hypervisor- or host-based security is the best method to monitor for intrusions.
ActivIdentity's Julian Lovelock discusses challenges in the IT security world today with Dan Kaplan, executive editor of SC Magazine, in this insightful In Focus video.
For a while, only traditional PCs were connected to the public internet. But with most devices now gaining networked capabilities, it's only a matter of time before your television can contract a virus.
A privacy officer at a global company found a way to collaborate efficiently at a top level, while ensuring the protection of company assets, reports Greg Masters.