Cloud Pinup: Bugcrowd – Crowdsourcing Cybersecurity

Cloud Pinup: Bugcrowd – Crowdsourcing Cybersecurity

To Catch a Thief: Crowdsourcing Cybersecurity There are literally thousands of hackers attacking the Internet on a daily basis. Their sheer numbers, if not the sophistication of any individual attack, makes for a corrosive environment that gradually wears down the security of even the most meticulously designed systems. If there is any vulnerability in the system, sooner or later someone will locate and exploit it. Private security contractors can be expensive, and in many cases…

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility A CIO friend of mine once told me that a hybrid cloud model enables him to “own the base, rent the spike” when it comes to unplanned events. Let’s face it – maintaining unused infrastructure for rare or random IT events is expensive and unnecessary in a cloud world. These same resources can be rented from a public cloud provider on standby and can be a far more…

Cloud Infographic: Security And DDoS

Cloud Infographic: Security And DDoS

Security, Security, Security!! Get use to it as we’ll be hearing more and more of this in the coming years. Collaborative security efforts from around the world must start as sometimes it feels there is a sense of Fait Accompli, that it’s simply too late to feel safe in this digital age. We may not be able to completely fix the issues with security prevention, but we can do a much better job recognizing patterns…

Mobile App Performance Management And The Rise Of Big Data

Mobile App Performance Management And The Rise Of Big Data

Mobile App Performance Management Most businesses, especially in the tech sector, never actually get to see their customers using the product they sell. Like doctors prescribing an exercise regimen, they must simply provide the tools and hope for the best. But these businesses could gain an enormous amount of insight from seeing how their applications and products actually work in customers’ lives. Translated into the tech industry, this is particularly important for app developers. Developers…

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks! So we are all cheering as the FCC last week made the right choice in upholding the principle of net neutrality! For the general public it is a given that an ISP should be allowed to charge for bandwidth and Internet access but never to block or somehow interfere with what content is sent over that line. It is simply critical from so many aspects. Equally an ISP…

Industry Expert Says Cyber-Security Is Not Fit For Purpose

Industry Expert Says Cyber-Security Is Not Fit For Purpose

Industry Expert Says Cyber-Security Is Not Fit For Purpose Several people have been claiming for a long time that anti-virus needs a major re-imagining, and after Mandiant released its annual M-Trends report on data breaches yesterday, that chorus of voices is only getting louder. Kowsik Guruswamy, CTO for Menlo Security, is responsible for one of those voices: “I’d say a new approach to cyber security is well overdue, but perhaps from a different perspective”, said…

Cloud Security: How Can GRC Help?

Cloud Security: How Can GRC Help?

Cloud Security An integrated GRC approach to cloud acceptance, adoption and scale includes the risk perspective from the beginning. Harnessing the power of cloud security with a GRC framework can promote and improve information security practices and drive better business performance. One of my favorite Dilbert cartoons shows Mordac, the “Preventer of Information Service,” saying, “cloud computing is no good because strangers would have access to our data.” Dilbert tries to explain encryption technology is…

The Value of Hybrid Cloud

The Value of Hybrid Cloud

The Value of Hybrid Cloud As the “cloud” continues to exert its dominance as the IT technology of the day, the question for many companies focuses on what type of cloud to choose: public, private, or a combination of the two, known as hybrid. Each has its advantages. Private cloud – owned and maintained by a private company for its own uses – generally offers the highest levels of control, but this comes with a…

Mirantis Collaborates With Google on Kubernetes and OpenStack Integration

Mirantis Collaborates With Google on Kubernetes and OpenStack Integration

Unites OpenStack with Containers to Accelerate Developer Productivity MOUNTAIN VIEW, CA – February 24, 2015 – Mirantis, the pure-play OpenStack company, today announced a new initiative that integrates Kubernetes with OpenStack, letting developers deploy containers on OpenStack in minutes. The integration gives developers immediate access to Kubernetes clusters with Docker containers without needing to set up infrastructure. Developers will be able to seamlessly move entire environments between OpenStack private clouds and public clouds that support…

History’s Worst Data Breaches

History’s Worst Data Breaches

History’s Worst Data Breaches We’ve mentioned before that with all the recent massive hacks on Sony, Microsoft, Home Depot, etc. companies are focusing more and more on the necessity of improved security measures. This recent surge of beefed up security has left some of us in the tech world wondering about some of worst hacks in history. According to an Infographic from Information is Beautiful: “The Court Ventures hack of 2012 appears to be the biggest…