Category Archives: Security

What Don’t You Know About Your Cloud?

What Don’t You Know About Your Cloud?

Looking Under The Hood Do you feel you know your cloud workloads well? Remember when those applications were running locally? You knew every quirk and cared for every surge. Now, they are in the cloud, and everything is different. Sometimes it feels like you barely know them at all. You’re right In many ways it’s…

The Future Of Cybersecurity

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Committee voted to approve the Cybersecurity Information Sharing Act (CISA), moving it one…

Survey Says SaaS Help Desk Is A Must-Have

Survey Says SaaS Help Desk Is A Must-Have

SaaS Help Desk Is A Must-Have Cloud based help desk software lets you automate the management of your IT support, customer support, and IT assets. And it’s moving beyond its nice-to-have status and fast becoming a must-have application for companies of all sizes. That’s what my company, ManageEngine, discovered in a recent user survey —…

Educating To Create Global Innovation

Educating To Create Global Innovation

Global Innovation China, which is seen by many as one of the biggest espionage threats to cyber security in the US, is back-stepping and changing its attitude to global commerce. This is the opinion of Condoleezza Rice, former US secretary of State who says China previously had a plan to use the Chinese multinational networking…

Networks Can Be Used As Sensors To Enforce Security

Networks Can Be Used As Sensors To Enforce Security

Network Sensors & Security Enforcement As Cisco Live 2015 launched in California this week, a primary message the company sent out was that it is critical to lock out cybercriminals. But as methods of attack become increasingly sophisticated, and points of infiltration multiply, traditional methods of security are not enough. So instead of seeing computer networks as…

Cybersecurity: Managing Systems, Conducting Testing and Investigating Intrusions

Cybersecurity: Managing Systems, Conducting Testing and Investigating Intrusions

Cybersecurity Last week we discussed Symantec’s Internet Security Threat Report and explored the increasing types and levels of cybercrime individuals and organizations are threatened with. This week’s free whitepaper, Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions, teaches practical skills for protecting networks, systems, and data against cyber-attacks, and provides you with the tools to…

From Illusion To Reality: Up Personal On Cloud Computing Privacy

From Illusion To Reality: Up Personal On Cloud Computing Privacy

Cloud Computing Privacy We are under an illusion around the cloud computing. Without a doubt the benefits are incredible. However, cloud impacts personal user privacy and potentially exposes their private data in ways they may not have anticipated. Given that users don’t usually read the terms of service and privacy policies, it is unclear how…