Tag "Cloud"

Back to homepage
Software

The importance of an integrated security strategy

Integrated security strategies with complementary solutions are more effective than multiple layers of complex protection software One of the biggest challenges facing the security industry is joined-up thinking. With so

Hardware/Network

Why do we need a risk-based approach to authentication?

20 years ago, everyone worked at a desktop workstation hardwired into an office building. This made network security simple and organizations felt they could depend on the time-tested method of

Industry Insights

Businesses need to think differently data management in the digital age?

Increased use of digital technology is creating massive amounts of data from cloud, mobile, IoT and more, resulting in data deluge Companies across industries are racing to embrace digital transformation

Hardware/Network

Tackling the insider threat: Where to start?

Many organizations still believe the definition of an insider threat is limited to a rogue employee purposefully leaking embarrassing information, or nuking a couple of systems when he or she

Cloud

How can CIOs overcome the hinderances of legacy networks?

What is the hinderance that legacy infrastructure is having on enterprise technology, and how can CIOs overcome this? The legacy infrastructures that are present across most enterprise organisations are holding

Cloud

Microsoft & Google unable to detect new zero-day ransomware

The ShurL0ckr ransomware was able to avoid detection by a majority of anti-virus engines and cloud applications.As organisations have adopted cloud services to increase their productivity and agility, so to

Vendor News

Data and analytics maturity: Most organizations should be doing better

91 percent of organizations have not yet reached a transformational level of maturity in data and analytics, despite this area being a number one investment priority for CIOs in recent

Cloud

Cloud Security Is a Moving Target

Cloud risks have filled the news cycle of late, but the real cloud security landscape is nothing like the headlines would have you believe. Click here to view original webpage

Cloud

10 Steps to Evaluate Cloud Service Providers for FedRAMP Compliance

The Federal Risk and Authorization Management Program (FedRAMP) is a framework that provides a standardized approach to authorizing, monitoring and conducting security assessments on cloud services. It is an integral

Cloud

Innovative organizations build security into their cloud strategy

Businesses are increasingly evolving their security strategy to advance their cloud strategy. Based on research and interviews with industry practitioners, Hurwitz & Associates sees clear evidence that balancing velocity and