Cloud Security

F45df53d99605d46f5ae32b7bed9fe22

Anthem Breach: How Hackers Stole Credentials and Why Two-Factor Authentication May Help Prevent Future Phishing Scams

February 09, 2015 Added by:Thu Pham

If the Anthem attack was carried out as the result of using a single password, their access security wasn’t up to industry standards. Two-factor authentication may have thwarted attacks by requiring the use of a personal device to verify the identity of a system administrator or other technical employee with access to their database of millions of sensitive records.

Comments  (3)

21d6c9b1539821f5afbd3d8ce5d96380

Fear Hackers? First Invest in an IT Security Culture Change

January 14, 2015 Added by:Kevin L. Jackson

With all the news these days about cyberterrorism and hacking the cloud may seem like the last place you would want to put your precious information.

Comments  (1)

F45df53d99605d46f5ae32b7bed9fe22

Does Your Valuable Data Belong to Hackers?

January 05, 2015 Added by:Thu Pham

Every organization, regardless of size, is comprised of a variety of sensitive data - from HR and payroll handling medical, financial and personally identifiable employee data to your precious intellectual property. And each of these data types can be sold for a price on the black market, making them valuable to attackers financially as well as for blackmail purposes.

Comments  (6)

C58e402c41b06ade1da4ce5bab5e19aa

Moving from Alert-Driven to Intelligence-Driven Security

January 05, 2015 Added by:Paul Lipman

The emergence of smart, integrated, cloud-based security services will enable a transformation from an alert-centric to an intelligence-centric approach to security. This will vastly enhance the Chief Information Security Officer's (CISO’s) visibility and ultimately deliver substantial improvements in the robustness of the overall security posture.

Comments  (1)

C58e402c41b06ade1da4ce5bab5e19aa

Security in 2015: The Internet Becomes the Corporate Network Perimeter

December 05, 2014 Added by:Paul Lipman

The cloud has been widely hailed as the most disruptive force in modern business. Indeed, the world is in the midst of fundamentally profound transformations, enabled by the cloud, in the ways in which we access and interact with data and applications. Unfortunately, the security industry has not kept pace with these transformational trends, necessitating an equally profound change in the way we s...

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Phones, Phablets and Clouds - Securing Today’s New Infrastructure

December 03, 2014 Added by:Steve Durbin

Despite the undeniable corporate and consumer interest, the security and privacy implications of cloud and mobile connected devices are concerning many security professionals. Countless organizations are still playing catch up – Bring Your Own Device (BYOD) polices are only starting to be embedded, reviewed and updated. IT departments are overwhelmed with the amount of devices entering the workp...

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Can Hackers Get Past Your Password?

November 05, 2014 Added by:Steve Durbin

Password-based authentication is easy and familiar for customers, and is initially inexpensive for organizations to deploy at scale. But, while password-based authentication may be appropriate in some instances, it is no longer suitable for the wide range of services where it is currently being used.

Comments  (2)

F45df53d99605d46f5ae32b7bed9fe22

The True Cost of a Data Breach

October 20, 2014 Added by:Thu Pham

iThemes, a WordPress (WP) security provider, was recently breached and approximately 60,000 clients in their membership database had a slew of information stolen, including usernames, passwords, IP addresses and more. But, what is of particular concern is the fact that the company was storing their members’ passwords in plain text, which they admitted was in error in a 

Comments  (0)

F8e30e7b98452c80b7b3b258e6e2690f

Security and the Cloud: Closing the Gap as the Market Grows

September 22, 2014 Added by:John Hawkins

Many IT decision makers feel pressure to adopt the cloud for the sake of not being left behind. But moving to the cloud is usually easier said than done.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Event Preview: Suits and Spooks London: Sept. 12, 2014

September 03, 2014 Added by:Eduard Kovacs

The first European edition of Suits and Spooks, the cyber security conference that brings together decision makers and influential thought leaders in the industry, will be held in London on September 12.

Comments  (0)

21d6c9b1539821f5afbd3d8ce5d96380

National Cybersecurity = Cloud Computing Security

August 13, 2014 Added by:Kevin L. Jackson

A recent article Inc.com article claimed that the percentage of U.S. small businesses using cloud computing is expected to more than double during the next six years, from 37 percent to nearly 80 percent.

Comments  (0)

B742830daed9314883a0edc63daefc42

EBS Encryption: Enhancing the Amazon Web Services Offering with Key Management

July 23, 2014 Added by:Gilad Parann-Nissany

Full disk encryption is becoming more and more popular in cloud settings, and some of the smaller clouds like Google Compute Engine have supported it for a while. Amazon is a bit late to this game, and should lead the way in enabling customer control of encryption keys.

Comments  (1)

Dea535178c7cc66cd64a57946b006ef2

Key Management in the Public Cloud

June 27, 2014 Added by:HyTrust

Key management is the most important component in any enterprise-grade encryption system. Yet what is the right key management model if you are looking to the cloud?

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Big Data's Big Promise Isn't Here Yet

June 24, 2014 Added by:Tripwire Inc

What is interesting to me is how much hope people have for big data being the savior of the security world. I don’t believe that’s going to happen anytime soon.

Comments  (0)

Default-avatar

Two Signs You Should Invest in Cloud Computing Data Security

June 23, 2014 Added by:CipherCloud

The cloud is great, and the cloud is here to stay. But to enable a successful, secure cloud deployment, you'll need to rethink your existing security strategy.

Comments  (0)

Ee445365f5f87ac6a6017afd9411a04a

What is Continuous Compliance and Assurance?

June 18, 2014 Added by:Jon Long

The phrase "Continuous Compliance" is almost meaningless without an additional reference of "Assurance." I define continuous compliance and assurance as an ongoing process of proactive risk management that delivers predictable, transparent, and cost-effective results to meet information security goals.

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »