Posts Tagged ‘Cloud computing’

Bestselling Books at Infosecurity 2014

by Lewis Morgan @ITG It has now been a week since Infosecurity Europe 2014. This year was my first at Infosec, and I found it to be one of the most interesting and diverse events I have ever been to. During my short time on the IT Governance stand, I spoke to several people who […]

Leave a Comment

Cloud Computing: A Treasure Trove for Hackers

Image by Ivan Walsh via Flickr Above the Clouds: Managing Risk in the World of Cloud Computing By Dick Weisinger Security usually tops the lists of concerns that people have about the cloud. And now it seems like there is good reason. On a recent survey of 100 “elite” hackers at the 2010 Defcon conferenece, […]

Comments (4)

What You Can Do About Cloud Computing Security

Image via Wikipedia Cloud computing security risks are sometimes considered greater than cloud’s rewards. The industry is working to change that, and so can you. By James A. Martin Cloud computing offers many compelling benefits to organizations, such as reduced capital and operating costs and as-needed scalability. So why aren’t more businesses taking advantage of […]

Comments (3)

Tips for building security organization

Image via CrunchBase By: Brian Prince Businesses have increased expectations on the security team in recent years, sometimes producing a disconnect between what is expected and what the security team can deliver. In a new report, Forrester Research lays out some advice for building an effective security organization. As IT security has become a bigger […]

Leave a Comment

How to manage risk in the cloud

What is Cloud Computing and does it provide more protection to your business? Pre-order the Softcover; Pre-order the eBook. Cloud Computing will bring many benefits to organisations, some of which include reducing operating costs, reducing power consumption and freeing you up to focus on your core business. The concept of shifting computing to a shared […]

Comments (4)

ENISA Cloud Computing Risk Assessment

Image via Wikipedia Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance The ENISA (European Network and Information Security Agency) released the Cloud Computing Risk Assessment document. The document does well by including a focus on SMEs (Small and Medium sized Enterprises) because, as the report says, “Given the reduced cost and flexibility […]

Comments (1)

Way beyond the edge and de-perimeterization

Image by pittigliani2005 via Flickr De-perimeterization term has been around almost for a decade and finally industry is taking it seriously because of virtualization and cloud computing popularity. Is it time for businesses to emabrace de-perimeterization? De-perimeterization is a double edge sword for industry which creates scalable options for operation and huge challenges for safeguarding […]

Comments (1)

Cloud Computing Pros and Cons

Cloud Application Architectures: Building Applications and Infrastructure in the Cloud Cloud computing is the future of the computing, which happens to provide common business applications online that run from web browser and is comprised of virtual servers located over the internet. Basic idea behind cloud computing is the accessibility of application and data from any […]

Comments (1)

Virtualization and compliance

Image by lodev via Flickr The core technology utilized in the cloud computing is virtualization. Some organization may not want to jump into cloud computing because of inherent risks can take a shot at virtualization in their data centers. Virtualization can be utilized to reduce hardware cost and utility cost. Organization that might have 100 […]

Comments (2)

RSA and cybersecurity

Image by Getty Images via DaylifeThis week I was in attendance with thousands of people from all over the globe at RSA conference in Moscone Center San Francisco. The conference offers variety of training tracks and this year included two new tracks physical security & governance and risk & compliance. Since Novell CNE was one […]

Comments (4)

Cloud computing and security

Cloud computing provide common business applications online that run from web browser and is comprised of virtual servers located over the internet. Main concern for security and privacy of user is who has access to their data at various cloud computing locations and what will happen if their data is exposed to an unauthorized user. […]

Comments (1)


SEO Powered By SEOPressor