Has Cybersecurity Become Too Reactive?

John Davis, CSO of Palo Alto Networks' federal division, suggested that too many firms have given in to the hackers by resigning themselves to this reactionary approach. "Some of our industry has given up on the ability to prevent and is focused primarily on detection and response, which means, with a mindset like that, it means you're always involved in cleaning up aisle nine, as some people like to say..."

Technology

5 Reasons Why The U.S. Dominates The Digital World!

By Johan Christenson | January 20, 2015

U.S. Dominates The Digital World! I have spent about half my working life in the US and the other half in Europe. During this time (25 years) it has been exciting to see digital trends over the years. There has…

Smart Umbrellas – Wearable, Portable and Stayable

By Scott Andersen | January 20, 2015

They automatically open when it starts to rain. A rising tide lifts all boats. What does a deluge do? Lifts everything, docks, piers, boats and anyone standing in the way. IoT post the Consumer Electronic Show is no longer a…

4 Different Types of Attacks – Understanding the “Insider Threat”

By Cloud Syndicate | January 19, 2015

Understanding the “Insider Threat” The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release…

Three Issues Facing the Internet of Things

By Daniel Price | January 16, 2015

The Internet of Things  The potential of the internet of things is enormous. While we might still be some years away from the technology reaching its zenith, the effect it is already having on our everyday lives is huge; from…

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

By Gary Gould | January 15, 2015

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga…

Cloud Infographic – Digging Into The Big Data Mines

By CloudTweaks | January 15, 2015

The Search For Big Data Mines In the past, value was placed on gold mines because of the precious and valuable things inside. Later, fossil fuels and oil fields became the places of value. Yet in our day, that has…

Cloud Concerns – Strong Passwords and Data Encryption

By CloudBuzz | January 15, 2015

Strong Passwords and Data Encryption For all the buzz surrounding cloud computing, some companies are still not buying in. The benefits that come from using the cloud are already well documented, and while adoption rates have risen in recent years,…

Who Wears The Wearables?

By Lauris Veips | January 15, 2015

The Wearables A rather curiously titled piece, “Fitness Trackers Only Help Rich People Get Thinner”, was published this Monday on the The Atlantic website. The benefits of fitness trackers, the author argues, are bound to be reaped by a select…

Skin Based Technology – The Intelligent Tattoo

By Steve Prentice | January 14, 2015

The Intelligent Tattoo I’ve got you under my skin: the rise of the intelligent tattoo As the Internet of Everything expands its reach to embrace many new areas of life, the race continues to develop more robust and accessible tools.…

Resolved: Username/Passwords Alone MUST Go

By Petteri Ihalainen | January 14, 2015

Username/Passwords MUST Go New Year’s Resolution #1 for any cloud IT deployment manager in 2015 ought to be that the user name/password alone must go.  High-profile breaches that exploit username and password-only authorization systems are becoming all-too-frequent events.   The Syrian…

POPULAR

What You Need To Know About Choosing A Cloud Service Provider

What You Need To Know About Choosing A Cloud Service Provider

Selecting The Right Cloud Services Provider How to find the right partner for cloud adoption on an enterprise scale The ...
Let's Look Into A Crystal Ball And See What The Future Holds For Cloud Computing

Let’s Look Into A Crystal Ball And See What The Future Holds For Cloud Computing

Let's look into the cloud computing future Wandering around town the other day I stopped in a psychic's storefront. I had ...
Why ‘Data Hoarding’ Increases Cybersecurity Risk

Why ‘Data Hoarding’ Increases Cybersecurity Risk

Data Hoarding The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated ...
open source cloud

Expect Open Source Security to Become a Major Focus in 2017

Open Source Security There is no doubt about it: We are living in the middle of the Digital Age. But ...
Cloud Services Are Vulnerable Without End-To-End Encryption

Cloud Services Are Vulnerable Without End-To-End Encryption

End-To-End Encryption The growth of cloud services has been one of the most disruptive phenomena of the Internet era.  However, ...
Machine Learning Is The New Proving Ground For Competitive Advantage

Machine Learning Is The New Proving Ground For Competitive Advantage

Machine Learning Is The New Proving Ground 50% of organizations are planning to use machine learning to better understand customers ...
Cloud Migration and Cyberwar

Cloud Migration and Cyberwar

Cyberwar Concerns This last week the Washington Post published a bombshell story on the recent attacks on the US election infrastructure ironically ...
SAP Migration To The Public Cloud

It’s Time To Move – Simplify Your SAP Migration To The Public Cloud

SAP Migration To The Public Cloud SAP transformations to hyper-scale cloud providers like Amazon Web Services (AWS) are gaining momentum ...