Attacks against the cloud, using the cloud for command and control of malware attacks, and securing endpoints are posing big worries for all industries, says Brian Kenyon of Blue Coat Systems.
It used to be that security was the one big barrier to organizations embracing the cloud. But Troy Kitch of Oracle says that not only is that barrier coming down, but now leaders are seeing cloud as a security enabler.
It's the ultimate challenge for government
agencies: How can they be both secure and
compliant - especially when operating in a
hybrid cloud environment?
Although the move to cloud could mean operational savings, it does not come without security concerns.
Download this whitepaper to explore:
The...
The cyber threats facing today's organizations are more sophisticated than ever before. This is evidenced by the number of breaches occurring in large, well-established organizations with the resources to deploy the most advanced cybersecurity available. Yet, despite their deep pockets, high-profile targets like...
Financial institutions around the world are targeted by cybercriminals more than any other industry. To minimize risks, it is required to evaluate the current state of your security, aggressively identify the most significant risks, and modernize your security infrastructure.
Many organizations have been adding...
It's the ultimate challenge for government agencies: How can they be both secure and compliant - especially when operating in a hybrid cloud environment? Trend Micro's Ed Cabrera offers insight into the unique challenges and emerging solutions.
As Microsoft pours huge investments into their cloud-based Office 365 offering and the business
case for migration to cloud-based services becomes more compelling, understanding the technical implications and business risks
of a migration is crucial for a smooth, safe transition. Those who are considering
a...
For a long time, cloud file sharing services such as Box and DropBox were the dirty little secret that IT pros did not want to talk about. Their convenience won over droves of office employees, who adopted the services to share files with coworkers, consultants and contractors - even with themselves: Cloud file sync...
Enterprise file sync and share (EFSS) adoption is now fairly universal, and IT pros have generally accepted its use as a part of enterprise computing today. With this increasing rate of adoption, the newest wave of concern for the large number of companies using EFSS solutions begs the question - how do we make sure...
For years, enterprises and the security community have debated whether the cloud is more secure or less secure than the datacenter. Always a strawman argument, now that debate becomes moot. The cloud is here to stay. And the job now is to operationalize security across the datacenter and into the cloud architecture,...
Enterprises recognize the value of cloud. Ovum research shows that 80% of organizations will be increasing their use of cloud services over the next two years. Employees want to use cloud services that are convenient, easy to use, and make their working lives simpler. However, business and employee views on cloud...
Enterprises recognize the value of cloud. Employees want to use cloud services that are convenient, easy to use, and make their working lives simpler. However, business and employee views on cloud rarely correspond. The outcome, often referred to as "shadow IT," is uncontrolled growth of cloud services, away from the...
You can't secure what you don't know you're using, especially cloud services. To safeguard data stored in the cloud, enterprises must accurately inventory their cloud computing contracts.
The cloud will be a growing part of your IT environment. This is inevitable, particularly in consideration of economics of the cloud and the opportunities in the Internet of Things. While information technology does move rapidly and with a degree of unpredictability, a comprehensive risk management approach, designed...
The rising profile and increasingly complex nature of cyberattacks was a major development in 2015. What are the key threats for security practitioners to be wary of in the year ahead? FireEye CTO APAC Bryce Boland shares insights.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.