Tag Archives: security technologies

CloudPassage Secures $25.5 Million – Strategy For Securing Cloud Environments

CloudPassage Secures $25.5 Million – Strategy For Securing Cloud Environments

Series C Funding Round Led by Shasta Ventures Validates Need for Purpose-Built Cloud Security and Compliance Platform  SAN FRANCISCO, CA–(Marketwired – Feb 13, 2014) – CloudPassage®, the Software Defined Security (SDSec) company, announced today that it has closed a $25.5 million Series C financing round. The round is led by Shasta Ventures and includes new investors,…

The Great Arms Race For Security: Virtualization

The Great Arms Race For Security: Virtualization Since its infancy in the early seventies when the first computer virus was created, the malware and anti-malware business has grown into multi-billion dollar industries. No longer are script kiddies creating malware for notoriety, instead the malware industry is run by organized criminals who invest time and money…

How Important Is Ethical Hacking For Enterprise Security Architecture?

How Important Is Ethical Hacking For Enterprise Security Architecture? With the increasing need for information security, business organizations which plan to adopt new technologies like IT outsourcing, virtualization, and cloud computing must be able to identify and face each security threats and come up with security architectures, policies, and processes. They must consider taking advantage…

US Cyber Command Chief Gives Cloud Computing Security His Vote of Confidence

US Cyber Command Chief Gives Cloud Computing Security His Vote of Confidence Even as cloud computing advances by leaps and bounds, security concerns remain. This issue has been addressed time and again by me in several articles. Even supporters of the cloud maintain that unless these problems are resolved, universal adoption will remain a dream.…

Homeland Security Subcommittee on Cybersecurity Conducts Hearing on Cloud Computing

Sometime back I had written an article on how US government officials had expressed reservations on adopting cloud computing (See: Does Moving to the Cloud work for the US Federal Government?). However, as per the testimonies from several Federal officials before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies, it would seem that, in…

HP Unveils Expanded Enterprise Security Solutions for the Instant-On Enterprise

HP Unveils Expanded Enterprise Security Solutions for the Instant-On Enterprise Comprehensive security services and technology portfolio delivers insight and protection against modern cyberthreats (PALO ALTO, Calif., Sept. 12, 2011) HP today announced its expanded Enterprise Security Solutions portfolio, designed to help enterprises establish and execute a comprehensive security strategy that addresses threats and potential liabilities…

Cloud Computing Sector to Witness More M&A in 2011, PwC Report

Cloud Computing Sector to Witness More M&A in 2011, PwC Report The rush for cloud-based technology solutions and development of virtualization and security technologies will fuel growing interest in cloud computing during 2011 and a new wave of mergers and acquisitions (M&A) is expected, a recent report by PwC revealed. Cost savings opportunities and growing…

Featured Writers

Top Viral Impact

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Whitepapers

Top Research Assets

HP OpenStack® Technology Breaking the Enterprise Barrier

HP OpenStack® Technology Breaking the Enterprise Barrier

Explore how cloud computing is a solution to the problems facing data centers today and highlights the cutting-edge technology (including OpenStack cloud computing) that HP is bringing to the current stage. If you are a CTO, data center administrator, systems architect, or an IT professional looking for an enterprise-grade, hybrid delivery cloud computing solution that’s open,…

Advertising Programs

Click To Find Out More!!

Sponsored Posts

Sponsored Posts

Sponsored Posts We have a dedicated readership, through our online, social media and email presence. Our goal is to continue to build our growing community, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more. In order to do so, we require the support from businesses looking to generate more exposure for…