Print Issue: June 01, 2011
What, in terms of security, should you expect from your cloud provider?
The explosion of internet-connected mobile devices, combined with the rapid move to cloud-based IT infrastructure and applications, is a security headache of epic proportions for many IT departments.
Using third-party cloud services, enterprises can quickly and affordably increase and decrease service or compute power at will.
Letters from our readers responding to news and opinion items on our website and feature stories and other items in our print magazine.
Data discovery is a fundamental factor in risk mitigation, says PixAlert CEO Gerard Curtin.
The so-called “zero-trust” model – making security ubiquitous throughout the network and not just at the perimeter – offers a fresh way of thinking about defending against threats.
Despite the fact that reports often stress the need for robust government and industry partnerships, they’ve been slow to take shape. What has held back this seemingly symbiotic relationship?
A new nonprofit, with roots at the Kennedy Space Center, isn’t concerned about shuttle launches and landings, but wants to be the facilitator for the security industry.
A need for risk managers with specific skills in business continuity planning and disaster recovery.
With more organizations hesitant to entrust their sensitive data to the cloud and a handful of high-profile breaches, providers are augmenting their protections capabilities.
Next post in Features