Recommended Whitepapers: 5 Best Practices For BYOD

smart-devices

Best Practices in BYOD: BlackBerry Enterprise Service 10 Take control of the iOS, Android™ and BlackBerry® devices in your organization, from one powerful, unified console. Manageability, security and support – these are just a few of the reasons BlackBerry® Enterprise Service 10 is such a powerful Enterprise Mobility Management (EMM) solution. But as you’ll learn

Enjoy Full Article

Cybercrimes And The Growing Importance Of SDN Technology

Moshe Ferber

Last months Cloud Security Alliance Central Eastern Europe Summit gave a good opportunity to learn about the Cloud Computing market in areas of Europe that are less reviewed. The congress, held in the center of the old city of Ljubljana, provided interesting mixture of Information Security professionals along with various cloud providers and end users

Enjoy Full Article

Algosec Study: Examining The Impact Of Security Management On The Business

deploy

The Impact of Security Management on the Business Survey of 240 information security professionals, network operations and application owners at organizations worldwide. Included is a recent  survey provided courtesy of the group over at Algosec.com A key finding in the study shows that many organizations have yet to migrate a significant percentage of their business

Enjoy Full Article

Cloudera Not Cutting It With Big Data Security

Cloudera Not Cutting It With Big Data Security  Cloudera is, for the moment, a dominating presence in the open source Hadoop landscape; but does it have staying power? While Cloudera’s Big Data platform is the darling of the Hadoop space, they and their open source distribution competitors have so far failed to adequately address the

Enjoy Full Article

How Hosted PBX Can Enhance Cloud Security

How Hosted PBX can enhance Cloud Security Cloud security has become a critical job responsibility for a majority of North American IT professionals.  In its recent survey, AccelOps, Inc., a leader in integrated Security Information and Event Management (SIEM), performance and availability monitoring software, interviewed 176 IT security professionals.  One of the key findings was

Enjoy Full Article

Big Data And eDiscovery: Professionalism Pays

Optimized-Alon_0558

Big Data and eDiscovery: Professionalism Pays Big Data is a hot concept in the business world right now. As a business phenomenon, the immediate benefits of utilizing Big Data are part reality and part hope. On the reality side, most medium and large-sized organizations do have some form of Big Data issues to contend with, meaning they

Enjoy Full Article

Cloud Computing Startups Raise Big Money: UPDATE 10

Vaultive

Cloud Computing Startups Raise Big Money: UPDATE 10 Today, there are two startups in focus – Vaultive and Eccentex. Vaultive Cloud data encryption services provider Vaultive recently completed a $10-million funding round led by .406 Ventures, New Science Ventures and Harmony Partners. Headquartered in New York with its R&D center in Tel Aviv, Israel, Vaultive

Enjoy Full Article

Trend Micro Named – 2011 Readers' Choice Award Winner

Trend Micro Named as SearchSecurity.com™ 2011 Readers’ Choice Award Winner CUPERTINO, Calif., Oct. 3, 2011 — Trend Micro Incorporated, a global cloud security leader, announced Trend Micro InterScan Messaging Security Suite was awarded the gold medal in the Messaging Security Products category of the SearchSecurity.com 2011 Readers’ Choice Awards. According to SearchSecurity.com, users gave Trend

Enjoy Full Article

Second Annual Cloud Computing Security Alliance Congress – November 16-17, 2011

Second Annual Cloud Computing Security Alliance Congress – November 16-17, 2011 In 2010, cloud computing began the shift from a ‘nice to have’ to a ‘need to understand’ technology, as the promises of cost efficiencies and agility have begun to bear fruit. The Second Annual Cloud Security Alliance Congress, the industry’s only conference devoted to

Enjoy Full Article

Is The Cloud Outsourcing or Not?

Here are to two interesting perspectives regarding this topic. Who’s right? Below is a blog post found at ComputerWeekly discussing… An article in Computerworld UK reports that the latest advice from the Information Security Forum (ISF) is that information security professionals should treat cloud computing as they would any other external supplier. “Cloud is just outsourcing”

Enjoy Full Article

Information Security Professionals Need New Skills to Secure Cloud-based Technologies, Study Warns

Information Security Professionals Need New Skills to Secure Cloud-based Technologies, Study Warns More than 70 percent of information security professionals admit they need new skills to properly secure cloud-based technologies, a survey conducted by Frost & Sullivan and sponsored by (ISC)2  revealed. The 2011 (ISC)2 Global Information Security Workforce Study (GISWS) is based on a

Enjoy Full Article