Category Archives: Security

Why Organizations Move To Amazon AWS

Why Organizations Move To Amazon AWS

Maximization of Cloud Opportunities  Sponsored series by CloudMGR When linked with the correct choice of provider, visibility and control in the cloud provide organizations with security as well as cost savings, speed, agility, efficiency, and innovation. Amazon Web Services (AWS) is one such provider which allows for the maximization of cloud opportunities, promising scalability, the…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

News: Decision Made In Net Neutrality Ruling

News: Decision Made In Net Neutrality Ruling

WASHINGTON — High-speed internet service can be defined as a utility, a federal court has ruled, a decision clearing the way for more rigorous policing of broadband providers and greater protections for web users. The decision from a three-judge panel at the United States Court of Appeals for the District of Columbia Circuit on Tuesday…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

The Week In Tech – NVidia AI Inception Program and Google Goes Wireless?

The Week In Tech – NVidia AI Inception Program and Google Goes Wireless?

The Week In Tech Much of the news coming out of the technology sector this week focused on looking ahead to new challenges, and deploying new technologies to solve difficult global problems. Here are some of the standout developments in the technology sector this week. Nvidia, the American pioneer in GPU-processing, announced the establishment of…

The Linux Foundation’s Core Infrastructure Initiative Invests In Security Tool

The Linux Foundation’s Core Infrastructure Initiative Invests In Security Tool

Identifying Web Application Vulnerabilities Grant Accelerates Work to Deliver OWASP ZAP as a Service, Making It Accessible to More Developers SAN FRANCISCO, CA–(Marketwired – June 03, 2016) – The Core Infrastructure Initiative (CII), a project managed by The Linux Foundation that enables technology companies, industry stakeholders and esteemed developers to collaboratively identify, fund and improve…

Category Archives: Security

Why Organizations Move To Amazon AWS

Why Organizations Move To Amazon AWS

Maximization of Cloud Opportunities  Sponsored series by CloudMGR When linked with the correct choice of provider, visibility and control in the cloud provide organizations with security as well as cost savings, speed, agility, efficiency, and innovation. Amazon Web Services (AWS) is one such provider which allows for the maximization of cloud opportunities, promising scalability, the… Continue Reading

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to… Continue Reading

News: Decision Made In Net Neutrality Ruling

News: Decision Made In Net Neutrality Ruling

WASHINGTON — High-speed internet service can be defined as a utility, a federal court has ruled, a decision clearing the way for more rigorous policing of broadband providers and greater protections for web users. The decision from a three-judge panel at the United States Court of Appeals for the District of Columbia Circuit on Tuesday… Continue Reading

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported… Continue Reading

The Week In Tech – NVidia AI Inception Program and Google Goes Wireless?

The Week In Tech – NVidia AI Inception Program and Google Goes Wireless?

The Week In Tech Much of the news coming out of the technology sector this week focused on looking ahead to new challenges, and deploying new technologies to solve difficult global problems. Here are some of the standout developments in the technology sector this week. Nvidia, the American pioneer in GPU-processing, announced the establishment of… Continue Reading

Data Breaches: Incident Response Planning – Part 2

Data Breaches: Incident Response Planning – Part 2

Incident Response Planning – Part 2 Continued from Part 1… As an estimated 50 million consumers were yet to be informed more than a month after the breach discovery, a Senate health committee had to intervene. But that wasn’t the end of Anthem’s missteps — it took customer’s days after calling a dedicated phone line… Continue Reading

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to… Continue Reading

The Linux Foundation’s Core Infrastructure Initiative Invests In Security Tool

The Linux Foundation’s Core Infrastructure Initiative Invests In Security Tool

Identifying Web Application Vulnerabilities Grant Accelerates Work to Deliver OWASP ZAP as a Service, Making It Accessible to More Developers SAN FRANCISCO, CA–(Marketwired – June 03, 2016) – The Core Infrastructure Initiative (CII), a project managed by The Linux Foundation that enables technology companies, industry stakeholders and esteemed developers to collaboratively identify, fund and improve… Continue Reading

Small Businesses CAN Compete Using The Cloud

Small Businesses CAN Compete Using The Cloud

Small Businesses Cloud In the past, small business owners had to either run applications or software that was downloaded physically onto a computer. Not only was this process pricey, it’s now a relic of the past that can put your business as a major disadvantage. Thanks to the cloud, business owners access information on any… Continue Reading