Cloud Ready In my article last month, I discussed how the managed service provider (MSP) industry has been continuously urged to embrace the cloud, but in the end, could they? [...]
Enforcing Security Policies To comply with global industrial standards, businesses are often required to set up internal security policies. These policies aim to regulate and make transparent the use of [...]
Cybercriminal Report Users are the weakest link when it comes to cybersecurity, with only 1 percent representing 75 percent of the security risk in a cloud environment, according to a [...]
Public-Private Cyber-Catastrophe The increasing risks from cyber threat could result in the United Kingdom (and other countries) being exposed to “catastrophic consequences” that could never be covered by existing insurance [...]
The Cloud and Cybersecurity Tomorrow’s digital enterprise is at war today. War not only with external cybersecurity hackers and viruses, but also within the organization itself – a conclusion based [...]
Hoarders and Data Collectors In our physical world, hoarders are deemed “out of control” when they collect too much. Surely the same analogy applies in our online world. When providers [...]
Cybersecurity Survey Reveals Endpoint Risk A survey conducted at Black Hat 2015 reveals that endpoint poses the greatest security to threat to cybersecurity, with 90 percent of respondents stating their [...]
US Government OPM Cyber Breach Much Worse Than Reported The much publicized breach at the US government Office of Personnel Management (OPM) in May this year was much more serious [...]
World Wide Web Labeled Wild Wild West of Internet Cyber Attacks A new “threat report” labels the World Wide Web (www) the Wild Wild West of cyber warfare stating that [...]
Risks Of Virtualization Server virtualization is one of the cornerstone technologies of the cloud. The ability to create multiple virtual servers that can run any operating system on a single [...]
Securing IoT Ah, security. It is the dulcet tone of a symphony that we play over and over in the IT world. IoT (Internet of Things) and the myriad of [...]
Cyber Security Threat A recent whitepaper on cyber security in the US government reveals that that the increasing number of mobile phones being used within federal agencies is escalating the [...]
Record Year For Data Breaches The news is full of data security breaches. This week, Sputnik International reported that Hacking Team had a 400 GB database stolen and published, and [...]
7 Main Cloud Security Mistakes Like sharks off the coast of North Carolina this summer, information security threats are lurking. And now that cloud computing is woven into the fabric [...]
Explore top-tier education with exclusive savings on online courses from MIT, Oxford, and Harvard through our e-learning sponsor. Elevate your career with world-class knowledge. Start now!