Menu

Blogs

Showing Blog Posts: 1–10 of 79 tagged Cloud Security

  • 10 Attributes of a NextGen Security Program

    by Rook Security on November 30, 2016

    By Mat Gangwer, CTO, Rook Security The uptick in the number of data breaches in the recent months has placed more focus and attention on companies’ security processes and programs. It is critical to begin planning and executing a security program with the proper tools in place to efficiently block, notify, and respond to threats while effectively controlling security resources and utilization to…

  • How to Protect Your Business When Your Cybersecurity Team Is Understaffed

    by Nathan Eddy on November 14, 2016

    There is a negative unemployment rate in IT security, which has led to a shortage of available talent in the market, with many firms unable to attract or evaluate key security talent. According to a Peninsula Press analysis of numbers from the Bureau of Labor Statistics, there were 209,000 unfilled cybersecurity jobs in the U.S. in 2015, with information security job postings up 74 percent in the…

  • Internet of Things: It’s Not Just the Devices!

    by Ed Skoudis on October 24, 2016

    With the holiday season around the corner, families are about to introduce a new raft of high-tech, Internet-connected gadgets into their homes worldwide. At the same time, enterprises are increasingly deploying automated building control systems and lighting technologies. Local governments are also getting in on the act as the move toward smart cities gathers steam. These advancements represent…

  • Infrastructure as Code: Managing Servers in the Cloud

    by Ben Rothke on August 19, 2016

    Many organizations have entered the world of cloud services, only to find it is not the panacea that they were lead to believe it would be. For example, while it’s relatively easy to spin up new servers in AWS (Amazon Web Services), managing those servers once they are operational is not such an easy endeavor. In Infrastructure as Code: Managing Servers in the Cloud (O'Reilly Media ISBN-10:…

  • Mobile Security Vulnerabilities Are Creating Big Problems

    by Sean Cunningham on August 2, 2016

    We hear constantly about devastating cyber attacks on government institutions, corporations and health care providers. Last summer, an attack against the U.S. Office of Personal Management exposed personal information about millions of federal employees. Successful cyber assaults against major American corporations such as Target, Sony and J.P. Morgan Chase also attracted attention. And barely more…

  • The Future of Cloud Security Starts with the Hypervisor

    by Liviu Arsene on June 28, 2016

    The worldwide x86 server virtualization market is expected to reach $5.6 billion in 2016, and Gartner estimates it has reached its peak, having significantly matured. OS container-based virtualization and cloud computing have gained in popularity, with organizations' server virtualization rates reaching up to 75 percent. While hypervisor technologies have been split into Type 1 (native – or bare…

  • Big Data Is a Big Cybersecurity Problem for Banks

    by Caitlin Moriarity on June 1, 2016

    How many financial service companies are vulnerable to a data breach? Way too many, according to a new report. The report, put together by data security company Vormetric and issued in partnership with analyst firm 451 Research, shows that a whopping 90 percent of the IT security professionals surveyed in the financial services industry believe that their companies are vulnerable to a possible…

  • Detecting Attacks Takes More Than Just Having the Latest Tools

    by Gib Sorebo on April 27, 2016

    In this fascinating Peer2 Peer session How Do You Detect Attacks? participants representing enterprise customers, product vendors, and service providers all weighed in on some of the challenges they face detecting attacks. Many were monitoring their networks 24/7 with either in-house staff or managed security services providers. While there was some critique of the products they used and their…

  • Continuing the Conversation: Information Security Professionals in Higher Education

    by RSAC Contributor on April 25, 2016

    By Joanna Grama, Director of Cybersecurity and IT GRC Programs, EDUCAUSE When information security professionals get together, there is no shortage of conversation. From sharing points-of-view on the latest hot topic to swapping technology implementation tips, information security professionals are determined to learn from one another to advance the profession. This shared commitment to improving…

  • RSA Conference 2016: Security of Public Cloud Services—It Takes a Village

    by Ben Rothke on April 5, 2016

    At the RSA conference last month, I lead a Peer2Peer session on the topic of Security of Public Cloud Services: It Takes a Village. I and 25 others discussed the notion that cloud services are inherently a shared responsibility model. Far too many corporate users of cloud services often don’t realize that while the cloud provider may have every attestation from PCI to SSAE-16, that means nothing…

This document was retrieved from https://www.rsaconference.com/blogs on Sat, 03 Dec 2016 01:46:08 -0500.
© 2016 EMC Corporation. All rights reserved.