Email Alerts
-
Former @stake researcher Aitel insists on data classification
Know your data before turning to the cloud, says Dave Aitel, CTO of Immunity Inc. Aitel criticized traditional security technologies at FIRST Conference 2010. Article
-
Analyzing MSSP providers' log files for IT security events
Analyzing firewall, Windows server and antivirus log files can seem like an endless and tedious task, especially for an understaffed security team, but it's extremely important for detecting IT security events. Read more in this network security expe... Tip
-
Study on security in cloud computing shows angst, rogue users
Many IT pros don't know the number of cloud-based services used in the enterprise and few are taking chances moving sensitive data to the cloud, a Ponemon Institute survey finds. Article
-
Is Internet hijacking one of the main cloud computing threats?
Does cloud computing lend itself particularly to Internet traffic hijacking, or are there other more serious cloud computing threats that infosec pros should address first? In this expert response, Michael Cobb discusses what threats to be on the loo... Ask the Expert
-
Federal CISOs worry they can't effectively secure cloud computing
An (ISC)2 survey finds federal CISOs pleased with the government's efforts to improve network security, but lack support for hiring skilled security pros. Article
-
Cloud computing risks outweigh benefits, survey finds
The risks of cloud computing outweigh the benefits according to a survey of more than 1,800 U.S.-based IT professionals who are members of the ISACA organization. Article
-
Cloud computing risks, challenges
K. Scott Morrison, CTO at Layer 7 Technologies talks about the issues hindering adoption of cloud computing. Also, Wade Baker of Verizon on a security incident framework. News
-
Social media and cloud computing for financial services
Paul Smocer of BITS discusses the use of social media and cloud computing by financial services firms, including the inherent risks, and what you can do to mitigate them Video
-
Cloud computing risks: Secure encryption key management on virtual machines
As cloud computing grows in popularity, secure encryption key management becomes more vital. Michael Cobb explains the security risk affecting cloud computing and virtualized computing and why encryption key management policies need to be included in... Ask the Expert
-
Social networking risks, benefits for enterprises weighed by RSA panel
Social networking risks to enterprises may be outweighed by the benefits, but experts at the 2010 RSA Conference say infrastructure providers must improve security. Article
Security Management Strategies for the CIO