Keeping Your Business Data Secure In An Insecure World

Keeping Your Business Data Secure In An Insecure World If you’re a small or medium-sized business (SMB), you might be hoping keeping your head down and staying off the Cloud will keep your data safe from interlopers — hackers and government agencies alike. Yet Verizon Communications’ 2013 Data Breach Investigations Report found 72 percent of

Enjoy Full Article

Cloud Infographic: Keeping Your Business Safe Online

Business-Cloud

Cloud Infographic: Keeping Your Business Safe Online Today’s information security teams increasingly rely on security systems with big data capabilities. In order to seek out and detect today’s complex advanced persistent threats you need to monitor network, host and application behavior across your organization’s IT data. Read this white paper to understand the evolving security

Enjoy Full Article

Cloud Infographic: Is Your Password Safe On The Cloud?

password-cloud

Cloud Infographic: Is Your Password Safe On The Cloud? In the modern world of Internet connectivity, cloud computing, online banking, social networking, personal privacy and information security is essentially dependent upon password protection. Passwords are the crucial barrier that safeguards the personal information contained in the perhaps dozens of accounts that we interact with every

Enjoy Full Article

Cybercrimes And The Growing Importance Of SDN Technology

Moshe Ferber

Last months Cloud Security Alliance Central Eastern Europe Summit gave a good opportunity to learn about the Cloud Computing market in areas of Europe that are less reviewed. The congress, held in the center of the old city of Ljubljana, provided interesting mixture of Information Security professionals along with various cloud providers and end users

Enjoy Full Article

Signing On The Dotted Cloud

agreement-document

Signing on the Dotted Cloud One area where the virtual world of the cloud leads to a sense of discomfort has to do with signing documents and contracts. For centuries, the binding value of an agreement was based on an individual’s capacity to sign his or her name at the bottom – a visual and

Enjoy Full Article

Cloud Startup – Adallom, Bringing Security Exclusively To SaaS Businesses

saas

Cloud Startup – Adallom, Bringing Security Exclusively To SaaS Businesses Startup Adallom Goes Public After 18 Months Of Private Beta  Tal Klein, VP of marketing for the newest security specialist startup, Adallom, says that after eighteen months of beta testing, clients have urged Adallom to go public; so, public they are going. As of this Tuesday the

Enjoy Full Article

Algosec Study: Examining The Impact Of Security Management On The Business

deploy

The Impact of Security Management on the Business Survey of 240 information security professionals, network operations and application owners at organizations worldwide. Included is a recent  survey provided courtesy of the group over at Algosec.com A key finding in the study shows that many organizations have yet to migrate a significant percentage of their business

Enjoy Full Article

Cloud Security Alliance Annual EMEA Congress Discussions

encryption

Cloud Security Alliance Annual EMEA Congress Discussions It was as cloudy as Edinburgh could be in the autumn, when the “Cloud Security Alliance Annual EMEA Congress” featuring about 300 Cloud Computing stake-holders, gathered for the event that was held during the last week of September, produced By MISTI Europe. The variety of organizations participating demonstrated the

Enjoy Full Article

Firehost Reveals Increases In Cyberattacks In Its Superfecta Report

Chart

Firehost Reveals Increases in Cyberattacks in its Superfecta Report There are always wolves at the door, and they are relentless in both their creativity and determination when it comes to getting in. This is the message that can be gleaned from a report released Tuesday October 22, by FireHost, (www.firehost.com) a provider of managed, secure

Enjoy Full Article

Cloud Infographic: Information Security Workforce

security-workforce

Cloud Infographic: Information Security Workforce Everyday there are more articles citing security as the top concern holding back public cloud adoption. While cloud means many things to different people, so does the term security. In discussions with business and industry experts, security concerns really boil down to the classic CIA—now CIAA—triad: confidentiality, integrity, availability and the more

Enjoy Full Article

The Importance Of Monitoring Your IT Ecosystem

The Importance of Monitoring Your IT Ecosystem “If you can’t measure it, you can’t improve it.”                                                                      - Lord Kelvin (1824-1907), British physicist and engineer. Lord Kelvin, father of the absolute temperature scale now named after him, got it right more than a hundred years ago. Measurement is critical to improvement, whether it be a product

Enjoy Full Article

Social Media and Social Engineering – How To Win The War

Social Media and Social Engineering – How to Win the War “Man is by nature a social animal.”                           – Aristotle (384 BC – 322 BC), Greek philosopher and polymath. Let me begin by putting forth some interesting numbers: 62% of adults worldwide now use social media If Facebook were a country, it would be

Enjoy Full Article

The Lurking Threat of Bring-Your-Own-Cloud (BYOC)

Nimmy-Reichenberg

The Lurking Threat of Bring-Your-Own-Cloud (BYOC) A few generations back, when the Internet was still an unknown commodity and inter-office mail came around in manila envelopes graffitied with the crossed-out signatures of every recipient that envelope had ever met, network security was largely an in-house affair with data tapes and mainframes playing a central role.

Enjoy Full Article

Cloud Infographic: Cyber Threats

Gone phishing infographic

Cloud Infographic: Cyber Threats People have always feared that cloud computing is inherently lacking in security because of the distribution methods used, allowing it to be more public than necessary. But research and reports indicate that it is not less secure than enterprise computing as they actually both suffer from the same types of attack.

Enjoy Full Article