In the face of evolving threats and actors, traditional ID security strategies have been proven inadequate, says Entrust's David Rockvam. It's time for a security evolution.
Although the growth of cloud-based data centers offers opportunities to more rapidly deploy applications, it also raises new security issues, says Steve Pao, senior vice president at Barracuda Networks.
CipherCloud's Paige Leidig discusses a new offering that helps enable organizations rapidly adopt a cloud application as it protects sensitive data and ensures compliance to policies and regulations.
The weekly DDoS attacks on U.S. banks taught us a few important lessons including expect the unexpected. Attacks are bigger and smarter than ever before. And while the daily deluge might be a thing of the past, the impact remains.
Join this panel of DDoS experts, including the VP from a major US financial...
Governments and others using cloud-based services should keep 10 security tips in mind, including making sure they can maintain control of their data if a service provider goes bankrupt, says Dimitra Liveri, co-author of a new report.
Attempts to shame China haven't been effective in stopping that country from pilfering intellectual property from the computers of American companies, according to a new report to Congress from a special commission.
FS-ISAC has issued a white paper with tips on streamlining third-party software risk assessments. One member of a new working group explains why the adoption of standard security controls is so critical.
Online file sharing technologies are pervasive, as mobility and collaboration continue to increase. This means unprecedented exodus of organization's data through consumer file sharing services. But hackers have also begun to use services such as Dropbox and Box to exfiltrate sensitive data, or even as command and...
Over the past year, sophisticated DDoS attacks have evolved as a tool of disruption and distraction, causing online outages, customer inconvenience, and reputational damage across all industries and geographies. There is no sign these attacks will cease - in fact, they will likely grow. How can you protect your site...
Consolidating Microsoft Active Directory isn't just a technical challenge, but a personnel one as well. Just ask Johnson Matthey's Steve Way, who had to calm dozens of administrators he labels as "masters of their own universe."
As organizations prepare to move critical workloads to the cloud, more stringent security and compliance requirements emerge. This report examines the strengths and shortcomings of existing cloud platform security technologies, and defines an approach to overcome these limitations and leverage existing technology to...
Even when NASA does something right, such as adhering to best practices in awarding a cloud computing contract, the space agency gets criticized by its inspector general for failing to leverage that contract throughout the organization.
The consumerization of IT and the popularity of BYOD are jeopardizing the security and integrity of enterprise data. Seeking an easy way to share files across smart phones, tablets, and desktops, employees are using free public cloud file sharing services that lack rigorous security and audit controls. These services...
Operating in a cloud environment opens up organizations to a new dimension of insider threat problems, says Alex Nicoll of Carnegie Mellon University's CERT Insider Threat Center.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.