Can McAfee’s New Security Updates Assuage Cloud Computing Fears?

Can McAfee’s New Security Updates Assuage Cloud Computing Fears? Security was, is, and will continue to remain a major issue in cloud computing. In spite of the relative newness of the technology, many companies are trying to improve matters in this field. These include startups (See: What Bromium’s Funding Means for Cloud Security ) as

Enjoy Full Article

Webinar: New Demands for Security and Compliance in Online Collaboration

Trends in Online Collaboration: When Security, Compliance and Productivity Collide Featured Analyst Firm: Gartner Speakers: Jeffrey Man Paul Hands Type: Audio (53 minutes) External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and

Enjoy Full Article

SafeNet Launches Webinar Series to Prepare Software Providers for Cloud Service Delivery

SafeNet Launches Webinar Series to Prepare Software Providers for Cloud Service Delivery Webinars Feature Industry Experts and Thought Leaders Delivering Best Practices for Services in the Cloud BALTIMORE–October 19, 2011– SafeNet, Inc., a worldwide leader in data protection, today announced the comprehensive educational webinar series, “Let’s Do It in the Cloud,” featuring presentations from some of

Enjoy Full Article

GlobalLogic and BMC Software Partner to Expand Product Engineering Lab

San Jose, CA – August 16, 2011 – GlobalLogic, Inc., a leader in software R&D services, announced today that it has been selected by BMC Software (NASDAQ: BMC) to expand the company’s current R&D Lab in Kyiv, the capital city of Ukraine. The selection builds on BMC Software’s successful partnership with GlobalLogic in Kyiv and

Enjoy Full Article

Cloud Security Still Top Priority For Finance Execs

Cloud Security Still Top Priority For Finance Execs In the wake of the recent Sony PlayStation hack, Amazon EC2 outage and Epsilon data theft, information security is once again back in the news – for all the wrong reasons. The web has become a playground for hackers and malcontents eager to phish, defraud and steal wherever

Enjoy Full Article

IT Security is Integral to Cloud Policy Planning

IT Security is Integral to Cloud Policy Planning You’ve seen the movie version: a crack team of hardened (but lovable) thieves exercise their wits and prowess to break into a super-secure facility in order to steal a computer with data that will put away even worse bad guys and save an orphan or two as

Enjoy Full Article

Is The Cloud Outsourcing or Not?

Here are to two interesting perspectives regarding this topic. Who’s right? Below is a blog post found at ComputerWeekly discussing… An article in Computerworld UK reports that the latest advice from the Information Security Forum (ISF) is that information security professionals should treat cloud computing as they would any other external supplier. “Cloud is just outsourcing”

Enjoy Full Article

Information Security Professionals Need New Skills to Secure Cloud-based Technologies, Study Warns

Information Security Professionals Need New Skills to Secure Cloud-based Technologies, Study Warns More than 70 percent of information security professionals admit they need new skills to properly secure cloud-based technologies, a survey conducted by Frost & Sullivan and sponsored by (ISC)2  revealed. The 2011 (ISC)2 Global Information Security Workforce Study (GISWS) is based on a

Enjoy Full Article

Can The RSA Conference Help Dispel Cloud Computing Security Fears?

Can The RSA Conference Help Dispel Cloud Computing Security Fears? “The greatest barrier to success is the fear of failure.” – Sven Goran Eriksson, noted soccer coach. It’s no secret that fear about security, or lack of it, is the major stumbling block ahead of universal adoption of cloud computing. While many of the concerns

Enjoy Full Article

Computing Without Borders – What Works, What Doesn’t

Computing Without Borders “Information is the oxygen of the modern age. It seeps through the walls topped by barbed wire, it wafts across the electrified borders.” – Ronald Reagan (1911-2004), 40th US President. “You live in the age of interdependence. Borders don’t count for much or stop much, good or bad, anymore.” – Bill Clinton,

Enjoy Full Article

Cloud Security Alliance’s Offers Certification

The Cloud Security Alliance’s Certificate of Cloud Security Knowledge (CCSK) is now open for testing at www.cloudsecurityalliance.org/certifyme. The industry’s first user certification program for secure cloud computing, the CCSK is designed to ensure that a broad range of professionals with responsibility related to cloud computing have a demonstrated awareness of the security threats and best

Enjoy Full Article

Firms need to get over their fears and dive into the cloud

Cloud computing is set to be mainstream in the business world in the coming years. Dr Giles Hogben is the program manager for secure services at the European Network and Information Security Agency (ENISA) What is the strategic imperative that would drive businesses across Europe to embrace cloud computing? Cost, flexibility and the ability to

Enjoy Full Article