Blog Posts Tagged with "Managed Services"

Ebe141392ea3ebf96ba918c780ea1ebe

The Security Poverty Line and Junk Food

April 16, 2012 Added by:Wendy Nather

Organizations below the security poverty line tend to be inordinately dependent on third parties and have less direct control over the security of the systems they use. They end up ceding risk decisions to third parties that they ideally should be making themselves...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Zeus Trojan Takes Aim at Cloud Payroll Services

April 12, 2012 Added by:Headlines

"Zeus captures a screenshot of a Ceridian payroll services web page when a corporate user whose machine is infected... visits this website. This allows Zeus to steal the user id, password, company number and the icon selected by the user for the image-based authentication system..."

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Cloud Security: Forecast Sunny with Possibility of Showers

April 04, 2012 Added by:Fergal Glynn

Even as companies are adapting to this new paradigm, there are growing concerns about the safety of their data in the cloud. Incidents at cloud service providers like Dropbox highlight dangers of storing information in the cloud...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Cloud Services Strategy: Security First - Growth Second

March 30, 2012 Added by:Richard Stiennon

Cisco, Juniper, Oracle, and Microsoft might have security initiatives and even good sales of security products. But security takes a back seat to functionality too often. Why are there no secure switches? Secure apps for Windows? Or secure databases?

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Cloud Security and the Enterprise

March 29, 2012 Added by:Ben Kepes

We need to ensure that legislation and regulations for cloud services truly reflect the realities of the cloudy world we live in and do not allow for a shotgun approach to compliance that primarily meets the needs of just one powerful interest group...

Comments  (0)

83a1969531a4f021a9f7339e222ab995

New Release of COREvidence Multi-Engine Vulnerability Service at RSA Conference

March 29, 2012 Added by:Nabil Ouchn

This newest release comes with a bunch of new features and concepts. The dashboard has been designated to display clear and specific data for our users. At a glance customers can determine the assets with the least secure status. All relevant information is at your fingertips...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Data Back-Up Strategies for Your Business

March 25, 2012 Added by:Robert Siciliano

Do you backup data? One of the problems with getting a small businesses to secure data is they think they need to load up thumbdrives, DVDs or tape devices manually. This is in fact tedious and overwhelming. I’ve got news for you, data backup is easy...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Transborder Data Flows at Risk

March 22, 2012 Added by:David Navetta

The proliferation of comprehensive data privacy laws, more or less on the European model, increasingly requires US-based multinationals and online companies to adapt to strict requirements for dealing with individuals in other countries...

Comments  (0)

3071bd3c5c013c8c3defcccad0259c16

Reaching for the Cloud: A Contemporary Infosec Perspective

March 21, 2012 Added by:Hani Banayoti

We need to entrust information security to professionals who not only know the fundamental principles and technologies, but are also able to understand and support the business's goals in order to influence and contribute positively to the ongoing infosec challenge...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

On Security, Legislation and Cloud Vendors

March 16, 2012 Added by:Ben Kepes

Ever since the MegaUpload case, when innocent customers of an admittedly generally dodgy cloud service lost their data after a global take-down notice, it has concerned me that more mainstream vendors might have an impending issue they need to think about...

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

Going Back to the Stack

March 15, 2012 Added by:Wendy Nather

If you have parts of your infrastructure outsourced, go over your contracts with your providers. You want them to be able to give you logs within a few minutes of the request and have the right technical support without fighting your way through first-level script-readers...

Comments  (0)

9f19bdb2d175ba86949c352b0cb85572

Understanding Cloud Security Part Two

March 14, 2012 Added by:Neira Jones

Organisations need to ask cloud providers to disclose security controls and how they are implemented, and consuming organisations need to know which controls are needed to maintain the security of their information. Lack of thoroughness can lead to detrimental outcomes...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Patchwork Cloud - What's the Deal with Cloud Security?

March 14, 2012 Added by:Rafal Los

Since everything I've been reading from the press, my colleagues, and analysts I know has been telling me security is ranked high in the top five concerns for cloud computing adoption - an article on ARN by Spandas Lui was like a bucket of ice water to the face...

Comments  (0)

9f19bdb2d175ba86949c352b0cb85572

Understanding Cloud Security Part One

March 11, 2012 Added by:Neira Jones

The cloud provides an opportunity to re-architect older applications and infrastructure to meet or exceed modern security requirements. At other times, the risk of moving sensitive data and applications to an emerging infrastructure might exceed tolerance levels...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

To the Cloud: Cloud Powering an Enterprise

March 10, 2012 Added by:Ben Rothke

Moving services to a public cloud means increasing your exposure to malicious attacks. This is not a potential increase, rather a definite increase. It is important to determine how well a cloud provider handles both technical and security requirements...

Comments  (0)

59da131e1207b6fadf8fec3862d85ad1

Cloud Security Report: The Cloud May Be Safer

March 05, 2012 Added by:alan shimel

This first installment of what promises to be a semi-annual report sheds some real light on the differences between on premises and cloud security environments, and also advances the notion that despite the FUD the cloud may in fact be safer for certain kinds of applications...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »