Entries from 2014-10-06 to 1 day

Was the Cloud ShellShocked?

Internet security has reached the highest defcon level. Another day, another hack – the new bug on the scene known as “Shellshock” blew up headlines and Twitter feeds.Shellshock exposes a vulnerability in Bourne Again Shell (Bash), the wid…

Cloud Security Vendors Poised for Growth

Security services have seen advances in identity and access management services; however, encryption services are lagging in the security industry. According to Gartner, revenues for identity and access management (IAM), remote vulnerabili…

Preventing Data Loss in a World of Industrialized Hacking

Every year billions of dollars are lost due to financial fraud and digital fraud has become one of the target markets for fraudsters. The best weapon for today’s business environment is big data and analytics supporting a robust data loss …

Cloud Security Requires a Multi-Layered Approach

Cloud service providers can make many promises regarding their data center’s physical security, but it is vital that you are able to understand the logical, remote and application dimensions to cloud security in that provider’s cloud stack…