Cloud Pinup: Sqrrl – Using Big Data To Take Big Security Risks

Cloud Pinup: Sqrrl – Using Big Data To Take Big Security Risks

Cloud Pinup: Sqrrl  How often do massive security hacks make front page news? It’s becoming such a common occurrence that many people barely bat an eyelid when a massive breach is announced, even though the risks for companies, consumers, governments is extremely high. Now, one innovative company “Sqrrl” is utilizing big data to build an advanced security platform that will help big organizations ward off threats. Increasingly, hackers are going after the biggest companies and…

Who’s Ready For The Cloud, And Can Deliver!

Who’s Ready For The Cloud, And Can Deliver!

Cloud Ready In my article last month, I discussed how the managed service provider (MSP) industry has been continuously urged to embrace the cloud, but in the end, could they? I answered the questions by describing several impediments and challenges that I believe are preventing MSPs from generating significant revenue and successfully fulfilling their client’s and prospect’s demands for cloud services. And although I painted a bleak picture of the current MSP business model’s ability…

The Growing Interest In FinTech – So What Is FinTech?

The Growing Interest In FinTech – So What Is FinTech?

What Is FinTech? FinTech, or financial technology, is a class of businesses that use software to provide financial services. The Wharton FinTech Club offers the following definition: Fin·Tech noun: an economic industry composed of companies that use technology to make financial systems more efficient. Generally startups, FinTech companies are typically established with the purpose of shaking up the present financial systems that are less software-reliant. They cover a broad range of industries from peer-to-peer lending…

Dealing With White-collar Cyberloafers

Dealing With White-collar Cyberloafers

White-collar Cyberloafers One particular compliance problem with cyber security is how to deal with employees idling in the office and misusing company Internet resources. This can lead to security issues such as worms, viruses, spyware and loss of the reputation for the company network. On some level this kind of problem can be seen to belong to the past early years of networking when white-collar workers were newly equipped with browsers and all the fun they…

Report: Cybercriminals Rely On People To Access Corporate Environments

Report: Cybercriminals Rely On People To Access Corporate Environments

Cybercriminal Report Users are the weakest link when it comes to cybersecurity, with only 1 percent representing 75 percent of the security risk in a cloud environment, according to a new cloud cybersecurity report released yesterday. The CloudLock Cyberlab analyzed 10 million users as well as 1 billion files and more than 91,000 applications and found that it isn’t the business of network infrastructure that cybercriminals target, but rather a very small number of users.…

Call For Public-Private Cyber-Catastrophe Reinsurance Scheme In The UK

Call For Public-Private Cyber-Catastrophe Reinsurance Scheme In The UK

Public-Private Cyber-Catastrophe The increasing risks from cyber threat could result in the United Kingdom (and other countries) being exposed to “catastrophic consequences” that could never be covered by existing insurance cover – with single event estimates ranging from between £2 billion to £20 billion ($3 to $30 billion). However, a public-private cyber-catastrophe reinsurance scheme would help the UK cyber-industry flourish by accelerating the much-needed growth of cyber insurance. According to a newly released report prepared…

Cloud And Cybersecurity: Five Things CISOs Need To Consider

Cloud And Cybersecurity: Five Things CISOs Need To Consider

The Cloud and Cybersecurity Tomorrow’s digital enterprise is at war today. War not only with external cybersecurity hackers and viruses, but also within the organization itself – a conclusion based on my discussions with information security managers and cloud architects around the world. While most executives understand the importance of a business driven, risk management-focused cybersecurity model, they do not address cybersecurity as an organizational issue, but more as a compliance or IT checklist issue.…

10 Potentially Obsolete Security Technologies

10 Potentially Obsolete Security Technologies

Systemic flaws and a rapidly shifting threatscape spell doom for many of today’s trusted security technologies Perhaps nothing, not even the weather, changes as fast as computer technology. With that brisk pace of progress comes a grave responsibility: securing it. Every wave of new tech, no matter how small or esoteric, brings with it new threats. The security community slaves to keep up and, all things considered, does a pretty good job against hackers, who…