Cyber Attackers Targeting the Keys to the Cloud Kingdom

Privileged Credentials Used to Administer Cloud Services Make an Attractive Target and Entry Point for Attackers. If your organization relies solely on the cloud vendor for security, you’re exposed to unnecessary risk. Being proactive in cloud security is a requirement to face...

Survey – 73% of citizens would provide biometric data such as fingerprints, retinal scans to government in exchange for more-personalized services

By CloudBuzz / September 20, 2018

Citizen Enthusiasm for Personalized Government Services and Digital Innovation Are on the Rise, Accenture Survey Finds  Greater comfort with artificial intelligence a factor in increased expectations for government innovation ARLINGTON, Va.; Sept. 20, 2018 – Enthusiasm for artificial intelligence (AI) is

Cyber Threat Alliance Releases Cryptomining Whitepaper

By CloudBuzz / September 19, 2018

Despite the recent devaluation of some cryptocurrencies, illicit cryptocurrency miners remain a lucrative and widespread attack vector in the threat landscape. These miners are easy to deploy, and attackers see it as a quick way to steal other users’ processing

Financial Services Firms Improve Their Cyber Resilience and Prevent More Than 80 Percent of Cyber Breaches, Accenture Study Finds

By CloudBuzz / September 17, 2018

Yet risks associated with emerging technologies, including machine learning and artificial intelligence, are prevalent and challenge existing security defenses NEW YORK; Sept. 17, 2018 – Despite the volume of cyberattacks doubling in 2017, financial services firms are closing the gap

GDPR Requires IRM For Fast and Effective Response

By CloudBuzz / September 14, 2018

This week, Gartner hosted its annual Security & Risk Management Summit in London and the buzz at the event centered on the new risks associated with the General Data Protection Regulation (GDPR). The discussion was fueled by the recent cyber attack

Marty Puranik

HIPAA Risk Assessment Guide for Smaller Practices

By Marty Puranik / September 10, 2018

HIPAA Risk Assessment Guide Disconcertingly, one in four practices (25%) are failing meaningful use audits by the Centers for Medicare and Medicaid Services (CMS). The #1 reason for failure is the absence of a full-spectrum healthcare risk assessment. These assessments

blockchain

BA apologizes after 380,000 customers hit in cyber attack

By CloudBuzz / September 7, 2018

LONDON (Reuters) – British Airways was forced to apologize on Friday after the credit card details of hundreds of thousands of its customers were stolen over a two-week period in the most serious attack on its website and app. The

Why Manufacturing is an Attractive Industry for Cyberattacks

By CloudBuzz / September 6, 2018

An estimated 48 percent of UK manufacturers have suffered a cyberattack at some point with half of them incurring financial losses or disruption to their business. Secureworks® research shows that manufacturing is one of the three most targeted industries when it comes

The Surprising Security Benefits of Moving Collaboration to the Cloud

By Melissa Pallotti / September 6, 2018

Cloud Security Collaboration How Backups, Remote Wipes, and Other Features Keep Your Data Safe By now, you’re probably aware that cloud computing powers a lot of the tools and applications you use every day. But cloud computing isn’t just the

Remote Patient Monitoring – One of the Most Important Applications of IoT in Healthcare

By CloudTweaks / September 5, 2018

Remote Patient Monitoring The application of IoT in Healthcare services is bringing the paradigm shift in terms of how this industry operates, the accuracy of diagnosis and quality of treatment. It is changing the model from ‘hospital-centric’ to ‘home-centric’, making

DATA SOVEREIGNTY

Data Sovereignty: the ONLY truly safe path to avoid Privacy Shield turmoil

By Bill Mew / August 30, 2018

DATA SOVEREIGNTY India is following Russia and others in imposing data sovereignty restrictions that specify that data must remain in country. Meanwhile the European Parliament has called for the suspension of Privacy Shield from 1st September. How should ethical, customer-centric

Thought Leaders

Four Trends Driving Demand For Data Security In 2017

Four Trends Driving Demand For Data Security In 2017

Data Security Trends 2017 will be a hallmark year for security in the enterprise as all industries have reached a ...
Best Practices in Disaster Recovery and Business Continuity

Best Practices in Disaster Recovery and Business Continuity

Best Practices in Disaster Recovery Hope for the best, prepare for the worst, and expect to be surprised. While that ...
Principles of an Effective Cybersecurity Strategy

Principles of an Effective Cybersecurity Strategy

Effective Cybersecurity Strategy A number of trends contribute to today’s reality in which businesses can no longer treat cybersecurity as ...
Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience - it's a lot like running a triathlon and ...
Built to Last: Choosing the Right Infrastructure Partner for Your Game

Built to Last: Choosing the Right Infrastructure Partner for Your Game

Choosing the Right Infrastructure Partner There are millions of gamers around the globe, and according to gaming market research firm ...
The Path to the Cloud: A Look at Different Approaches to Cloud Migration

The Path to the Cloud: A Look at Different Approaches to Cloud Migration

Different Approaches to Cloud Migration The public cloud has gained considerable momentum this past decade. Concerns about cost and security ...