A Closer Look at Insider Threats and Sensitive Data in the Cloud

By Sekhar Sarukkai | March 30, 2016

Sensitive Data in the Cloud A recent survey report conducted by the Cloud Security Alliance (CSA) revealed that  sensitive data in the cloud had reached a tipping point: 64.9% of respondents (which included IT security professionals from enterprises across all

The FBI’s War On Encryption – Now What?

By CloudBuzz | March 29, 2016

As of last night, Apple’s San Bernardino troubles are officially over. Yesterday, the FBI announced that it no longer needs Apple’s help in breaking into an iPhone linked to last year’s attacks, thanks to a new method for unlocking the phone

Evolving Internet of Things

IoT Infographic: The Evolving Internet of Things

By Jennifer Klostermann | March 29, 2016

Evolving Internet of Things  The Internet of Things, or IoT, a term devised in 1999 by British entrepreneur Kevin Ashton, represents the connection of physical devices, systems and services via the internet, and Gartner and Lucas Blake’s new infographic (below)

CloudLock Unveils Method For Isolating True Security Threats

By CloudBuzz | March 28, 2016

CloudLock New Method Q1-16 Cybersecurity Report: The CloudLock CyberLab’s “Cloud Threat Funnel” Methodology Reveals Distinct User Behavior Patterns, Helping Businesses Lock Into Only the Real Threats WALTHAM, MA–(Marketwired – Mar 28, 2016) – When is a security alert not a

The Department of Defence Cloud

Why Online Marketers Should Be Concerned About Privacy In The Cloud

By Mauricio Prinzlau | March 28, 2016

Privacy In The Cloud If you’re an average consumer, your concerns about the Internet Cloud systems should justifiably stem from the threat of the Unknown: is your data private? Is it secure? Do you own it, or does the cloud service

What Technology Can Displace The Password?

By Hitoshi Kokumai | March 25, 2016

The Future Password Many people shout that the password is dead or should be killed dead. The password could be killed, however, only when there is an alternative to the password. Let us think about what technology can displace the password. Some

what is documents and data?

FBI Hiring A “Third Party” To Hack Open San Bernardino iPhone?

By CloudBuzz | March 22, 2016

“Third Party” iPhone Hack Here comes a new twist in the ongoing Apple vs. FBI saga over the iPhone used by one of the shooters in last year’s San Bernardino terror attack. While nothing is confirmed yet, it seems like

The Rise of Fintech and the End of Traditional Banking

By George Foot | March 22, 2016

The Rise of Fintech Developments in financial technology, or fintech, are changing the way we make payments, with new products gradually transforming how personal and commercial transactions are processed. The pace of these developments has opened up a whole range

TELUS Investing $2 Billion Through 2020 In IoT, Cloud Services and Infosec

By CloudBuzz | March 21, 2016

Significant investment across the province will increase wireless speeds, extend TELUS’ fibre optic Internet network to even more homes and businesses, and help deliver better healthcare MONTREAL, QUEBEC–(Marketwired – March 21, 2016) – (TSX:T)(NYSE:TU) – TELUS intends to invest $2

cloud hosting for startups

Managing IT in a Hybrid Cloud World

By Jennifer Klostermann | March 18, 2016

Hybrid Cloud Management Recent reports have suggested that major organizations are making use of hybrid clouds to gain a competitive edge, with one study finding two-thirds of surveyed organizations employing hybrid clouds noting competitive advantages due directly to their hybrid

SECURITY

Server-less Computing Necessitates A Significant Mind Shift

Server-less Computing Necessitates A Significant Mind Shift

Server-less is More The author of the Pied Piper of Hamelin, Robert Browning, is one of my favorite English poets ...
Are You Thinking of Going to the Cloud Because of FOMO? Don’t!

Are You Thinking of Going to the Cloud Because of FOMO? Don’t!

The Fear of Missing Out A new study says FOMO – “Fear of Missing Out” is the reason cited by ...
RSA Conference: FUD-free or filled?

RSA Conference: FUD-free or filled?

IoT 15 Billion Units By 2021 At the annual RSA conference, there were plenty of discussions and presentations on the ...
Cyber Security Tips For Digital Collaboration

Cyber Security Tips For Digital Collaboration

Cyber Security Tips October is National Cyber Security Awareness Month – a joint effort by the Department of Homeland Security ...
Ransomware Cyber-Attacks: Best Practices and Preventative Measures

Ransomware Cyber-Attacks: Best Practices and Preventative Measures

Ransomware Cyber-Attacks “WanaCrypt0r 2.0” or “WannaCry,” an unprecedented global ransomware cyber-attack recently hit over 200,000 banking institutions, hospitals, government agencies, ...
Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 The lack of security of the Internet of Things captured public attention this year as massive ...
Four Cloud Security Mega Trends

Four Cloud Security Mega Trends

Cloud Security Trends Last year was a big year for the cloud. Cloud adoption continued to grow at a rapid ...
The Unintended – and Intended – Consequences of Cloud Data Sovereignty

The Unintended – and Intended – Consequences of Cloud Data Sovereignty

Cloud Data Sovereignty It seems that everything has unintended consequences – whether positive or negative. Intended consequences are those that ...
Countdown to GDPR: Preparing for Global Data Privacy Reform

Countdown to GDPR: Preparing for Global Data Privacy Reform

Preparing for Global Data Privacy Reform Multinational businesses who aren’t up to speed on the regulatory requirements of the European ...
Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Private Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle ...