Has Cybersecurity Become Too Reactive?

John Davis, CSO of Palo Alto Networks' federal division, suggested that too many firms have given in to the hackers by resigning themselves to this reactionary approach. "Some of our industry has given up on the ability to prevent and is focused primarily on detection and response, which means, with a mindset like that, it means you're always involved in cleaning up aisle nine, as some people like to say..."

Contributors

What’s Next In Cloud And Data Security For 2017?

By Daren Glenister | December 29, 2016

Cloud and Data Security It has been a tumultuous year in data privacy to say the least – we’ve had a huge increase in data breaches, including some of the largest in history; an uncertain future when it comes to…

The Key To Improving Business Lies In Eye-Interaction Tech

By CloudTweaks | December 28, 2016

Eye-Interaction Technology Analysts at Goldman Sachs predict virtual reality revenue will surpass TV within the next decade. More than just some gaming fad, VR represents a whole new way for organizations to train, research, and explore vast amounts of data.…

2017 Brings DLP Technology and IoT’s Weaknesses to Light

By CloudTweaks | December 21, 2016

DLP Technology In regards to data loss prevention (DLP), in the last five years many companies rushed to implement DLP solutions without taking the time to first identify the data that should not transit egress points. Most of these rushed…

Digital Identity Trends 2017 – Previewing The Year Ahead

By CloudTweaks | December 20, 2016

Digital Identity Trends 2017 The lack of security of the Internet of Things captured public attention this year as massive distributed denial of service attacks took down much of the internet. The culprits? Unsecured connected devices that were easily accessed…

5 Tips For Improving Enterprise Cloud Success In 2017

By Vidya Phalke | December 19, 2016

Improving Enterprise Cloud There has been an increase in the adoption rate of cloud technology to help businesses keep capital investment and maintenance costs down while benefiting from flexibility and rapid up and down-scaling as needs dictate. However, to maximize…

Four Trends Driving Demand For Data Security In 2017

By CloudTweaks | December 16, 2016

Data Security Trends 2017 will be a hallmark year for security in the enterprise as all industries have reached a tipping point with respect to cloud and mobile adoption, forcing more and more data beyond the corporate firewall. Over 100…

Data Breaches And Concerns Over Password Storing Methods

By CloudBuzz | December 15, 2016

Data Breach Concerns Data breaches have been plentiful over the past few years, and companies have lost millions of dollars and the faith of their users. However, the biggest in history may have just been discovered. Yahoo recently announced that…

Through the Looking Glass: 2017 Tech and Security Industry Predictions

By Mike D. Kail | December 15, 2016

2017 Tech and Security Industry Predictions As we close out 2016, which didn’t start off very well for tech IPOs, momentum and performance has increased in the second half, and I believe that will continue well into 2017. M&A activity…

Cyber Criminals Are Business People Too

By Todd O’Boyle | December 13, 2016

Cyber Crime Business You’re on the morning train on the way to work and take a look at the guy next to you. He’s clean-cut, wearing a crisp suit and holding a leather briefcase just like dozens of others. Just…

The Non-Holiday-Specific Mall For Cloud Solutions

By Scott Andersen | December 12, 2016

Cloud Solutions Mall If a mall were dedicated to cloud and cloud solutions and that mall had an Easter Bunny near that holiday, it stands to reason that mall would also set up a North Pole. Then CIOs and other…

POPULAR

Through the Looking Glass: 2017 Tech and Security Industry Predictions

Through the Looking Glass: 2017 Tech and Security Industry Predictions

2017 Tech and Security Industry Predictions As we close out 2016, which didn’t start off very well for tech IPOs, ...
Cloud Job Opportunities

Cloud Computing Continues To Present New Job Opportunities

Cloud Computing Job Opportunities Over the next decade we can expect many new cloud computing job opportunities to come to ...
Cloud Computing Then & Now

Cloud Computing Then & Now

The Evolving Cloud  From as early as the onset of modern computing, the possibility of resource distribution has been explored ...
Connecting the Power of IoT

Connecting the Power of IoT

Connection Power I come not to bury Caesar. Nor do I come to bury his estimates. Estimates, attempts based on ...
Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information ...
Trading Routine: How To Track Suspicious Events In Different Locations

Trading Routine: How To Track Suspicious Events In Different Locations

Tracking Suspicious Events Financial security can be compared to a constant arms race between cyber criminals and businessmen who try to ...
Inside the Equifax Hack

Was the Data Just Too Big? Inside the Equifax Hack

Inside the Equifax Hack Equifax is a gigantic financial organization, the entire livelihood of which revolves around collecting and analyzing ...
Business Intelligence And Analytics In The Cloud, 2017

Business Intelligence And Analytics In The Cloud, 2017

Business Intelligence In The Cloud, 2017 78% are planning to increase the use of cloud for BI and data management ...