Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

0
comments
Who Moved My Cloud?
By Allen Allison Managed cloud services are quickly being adopted by large enterprises. Organizations are increasingly embracing cloud technologies for core services like financial systems, IT infrastructure, online merchant sites, and messaging solutions. This adoption rate is creating an ever-i ...
Posted 03 May 2011 by Cloud Security Alliance (CSA)
0
comments
By Mark Bregman Chief Information Security Officers know instinctively that the world under their purview is undergoing a shift every bit as significant as the rise of the World Wide Web more than 15 years ago. The demand on our workforce to be ever more productive is driving us to rethink how we u ...
Posted 29 April 2011 by Cloud Security Alliance (CSA)
1
comment
Never confuse a single defeat with a final defeat.  – F. Scott Fitzgerald So last week was, depending on who you ask, a terrible week for "The Cloud," a wakeup call for businesses who want to use cloud services, or nothing all that surprising. In case you have only just e ...
Posted 28 April 2011 by Geoff Webb
0
comments
Protect the API Keys to your Cloud Kingdom
By Mark O’Neill Much lip service is paid to protecting information in the Cloud, but the reality is often seat-of-the-pants Cloud security. Most organizations use some form of API keys to access their cloud services. Protection of these API keys is vital. This blog post will explore the iss ...
Posted 20 April 2011 by Cloud Security Alliance (CSA)
0
comments
By Stuart Lisk, Senior Product Manager, Hubspan Are you losing sleep over whether to implement tokenization or full encryption as your cloud security methodology? Do you find yourself lying awake wondering if you locked all the doors to your sensitive data? Your “sleepless with security&rdquo ...
Posted 20 April 2011 by Cloud Security Alliance (CSA)
0
comments
Constant Vigilance
By Jon Heimerl   Constant Vigilance. Mad-Eye Moody puts it very well. Constant Vigilance. Unfortunately, these days we need constant vigilance to help protect ourselves and companies from peril. That is not to say that we can never relax and breathe. This is based on a key part of any decen ...
Posted 14 April 2011 by Cloud Security Alliance (CSA)
0
comments
Last time  I covered an introduction to BitLocker, the Trusted Platform Module (TPM) and what TPM does to assist in keeping your system secure. This time I'm writing about the most important aspect of BitLocker management – Recovery Keys (and Recovery Passwords too).  While one ...
Posted 14 April 2011 by Geoff Webb
0
comments
Cybersecurity: The Road Ahead
This paper by the Geneva Centre for the Democratic Control of Armed Forces (DCAF) was just brought to my attention. A piece of work that is definitely worth reading through. It lays out the problem space and then does a deep dive into the different sections: Governments Legislative Bo ...
Posted 14 April 2011 by Roger Halbheer
0
comments
Cloud Annexation
By Stephen R Carter   The Cloud is the next evolutionary step in the life of the Internet. From the experimental ARPANET (Advanced Research Projects Agency Network) to the Internet to the Web – and now to the Cloud – the evolution continues to advance international commerce and in ...
Posted 12 April 2011 by Cloud Security Alliance (CSA)
0
comments
On First Base with Stolen Email Addresses
CNN continues to report on the compromise of email addresses and names from Epsilon systems over the weekend and the potential impact it may have on net citizens. There is fear and uncertainty that comes with any compromise, but it is important to understand where this activity sits in the process o ...
Posted 04 April 2011 by Rick Robinson
0
comments
By Matthew Gardiner One of the key advantages of the cloud, whether public or private, flows from a well-known econometric concept known as “economies of scale.” The concept of economies of scale refers to an operation that to a point gets more efficient as it gets bigger – think ...
Posted 01 April 2011 by Cloud Security Alliance (CSA)
0
comments
Opening up BitLocker
It's hard to avoid the flurry of bad press following the recent loss of a laptop by a BP employee. Unfortunately for all concerned, the lost laptop contained the names and personal details of some 13,000 claimants from the Deepwater Horizon spill.  The problem, of course, is not that the lapto ...
Posted 01 April 2011 by Geoff Webb
1
comment
By Margaret Dawson The “cloud” is one of the most discussed topics among IT professionals today, and organizations are increasingly exploring the potential benefits of using cloud computing or solutions for their businesses. It’s no surprise Gartner predicts that cloud computing w ...
Posted 30 March 2011 by Cloud Security Alliance (CSA)
0
comments
By Anil Chakravarthy and Deepak Mohan Over the past few years, information explosion has inhibited organizations’ ability to effectively secure, manage and recover data. This complexity is only increasing as organizations try to manage the data growth by moving it to the cloud. It’s cle ...
Posted 29 March 2011 by Cloud Security Alliance (CSA)
0
comments
  Gone are the days of text user interfaces for exchanging data or email over the Internet. Now, users are hard pressed to exchange information without using HTML or any of the Web 2.0 features. When the WWW was in its infancy, our ability to share and download information propelled us from ex ...
Posted 25 March 2011 by Rick Robinson
0
comments
Public WiFi hotspots have shown tremendous growth in recent years. Much of this can be attributed to growing number of people carrying smart mobile devices (such as smartphones and tablets) and using bandwidth-consuming internet applications (such as gaming, social networking sites and audio/video s ...
Posted 23 March 2011 by Ajay Gupta
0
comments
Hey, You, Get off of My Cloud
By Allen Allison The emerging Public Cloud versus Private Cloud debate is not just about which solution is best. It extends to the very definition of cloud. I won’t pretend that my definitions of public cloud and private cloud match everybody elses, but I would like to begin by establish ...
Posted 22 March 2011 by Cloud Security Alliance (CSA)
0
comments
 By Slavik Markovich The move to cloud computing brings with it a number of attributes that require special consideration when it comes to securing data. And since in nearly every organization, their most sensitive data will be stored either directly in a relational database, or ul ...
Posted 21 March 2011 by Cloud Security Alliance (CSA)
1
comment
WiFi Hacking not Always a Cyber Crime
If someone is assuming that hacking/breaking into a WiFi router for piggybacking on the router’s internet connection is illegal, then he/she needs to double check the same with the applicable CyberLaw. This was highlighted in view of a recent WiFi hacking incident where a student broke into a ...
Posted 19 March 2011 by Ajay Gupta
0
comments
  WiFi security continues to hog the limelight with the series of related revelations and incidents happening periodically. And the latest in this series are the results of a online survey conducted by the UK's Information Commissioner’s Office (ICO) published recently, which revealed th ...
Posted 18 March 2011 by Ajay Gupta
Showing 321 - 340 of 492 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×