Entries from 2014-08-01 to 1 month

As Cloud Computing Adoption Skyrockets, Security Technologies must Follow

Cloud computing is a revolutionary force that’s played a role in changing the business operations of millions of enterprises ranging from various industries and markets of many sizes. Cloud computing has enabled companies to operate at low…

Carefully Monitor Cloud Policy Exceptions for Misuse

You know the old adage – “For every rule there is an exception.” (Please temporarily ignore the paradox this creates). This saying certainly seems to apply to every cloud access policy I have ever seen. Here are some of the most common exa…

90% of Impacted Cloud Providers Still Haven’t Updated Certificates 1 Week After Heartbleed

As we’ve reported, hundreds of cloud providers were vulnerable to the Heartbleed bug in OpenSSL even days after the vulnerability was widely publicized. Looking at the latest data pulled this morning, much progress has been made and there …

Cloud Service Brokers Emerge as Cloud Computing Skyrockets

Cloud service brokers act as middlemen serving customers and cloud service providers. Cloud service brokers aggregate several cloud services, integrate them in a customized fashion within your applications in order to meet your desired nee…

Modern Businesses must Employ Cloud Security Measures

Cloud computing is a chief disrupting force that’s affected thousands of industries of all tiers. Cloud computing has given organizations the ability to operate at lower expenditures, all while gaining a speedier version shipments, univers…

TweetDeck — Just another hack or a missed opportunity to tighten cloud security?

The recent TweetDeck hack on Twitter presents a common cloud dilemma for information security teams. On the one hand, the BYOX trends that drive cloud service adoption and worker self-enablement are transforming traditional IT into a User-…

100,000 Tweets in 1 Day – How One Company Discovered a Security Breach using Big Data Analytics

As the recent breach involving millions of Target customer credit cards illustrates, security breaches leave a pattern of activity that is mathematically unusual. As cyber criminals increasingly use the cloud as an attack vector, these att…

24 Hours After Heartbleed, 368 Cloud Providers Still Vulnerable

Over the past weeks, security teams across country have been grappling with end of life for Windows XP, which is still running on 3 out of 10 computers. That issue has been completely overshadowed with news of the Heartbleed vulnerability …

The Consumerization of IT, BYOC, and the (New) Role of IT

It has been a decade since Nicolas Carr published his controversial essay “IT Doesn’t Matter” in the Harvard Business Review. Back then, he claimed that companies weren’t really getting a competitive advantage from the technology advances …

Prevent the Loss of IP through Code Sharing Sites

Everybody has IP in their code nowCoding is not just for software companies anymore. Companies in every industry – financial services, transportation, media, manufacturing, healthcare – all rely heavily on developers to create internal sof…

Don’t neglect Data Loss Prevention (DLP) for the cloud

There was a time when data loss prevention (DLP) efforts were focused on storage devices, email, and printing. However, now that you can take your device with you, in the form of a laptop or mobile phone, a lot more attention has been focu…

The Great Russian Hacker Heist & the “Shadow ID” Problem it Exposed

On Monday the world learned that a small crew of Russian hackers stole 1.2 billion internet passwords. Before digging into what this means to your enterprise’s information security posture, I must first commend Nicole Perloth and David Gel…

Cloud Security Remains Top Concern for Chief Information Officers

Cloud computing is a major disruptive technology that has influenced thousands of businesses of all scales, in all sectors. Cloud computing has provided enterprises with cheaper costs, quicker deployment, and efficient accessibility featur…