Blog Posts Tagged with "Cloud"


3 Trends Driving the Need to Improve Your Third Party Cyber Risk Management (TPCRM) Program

May 09, 2017 Added by:Scott Schneider

Bad guys will continue to prey upon the path of least resistance - third parties. It’s up to you to ensure your organization takes a comprehensive and risk based approach - rather than focusing solely on compliance.

Comments  (0)


Cloud-Based Access Governance: Organizational Continuity Achieved

May 09, 2017 Added by:Dean Wiech

Cloud-based access governance can pull up a portal listing your web-based applications, whether they are hosted in the cloud or running locally within the organization, and can authenticate in the network.

Comments  (0)


4 Things that Make Cloud Compliance Harder Than You Think

April 06, 2017 Added by:John Martinez

There are some factors to take into consideration that may make compliance in the cloud a bit more challenging

Comments  (0)


Top 10 Cloud and Security Predictions for 2017

December 14, 2016 Added by:Shehzad Merchant

In the coming year, we might see a number of significant changes with respect to both the public cloud and information security.

Comments  (0)


The Role of CASBs in Protection Against the 2016 “Treacherous 12"

May 03, 2016 Added by:Ganesh Kirti

We looked at how well CASBs would fare in helping enterprises survive the treacherous 12 and guess what? CASBs clearly address nine of the treacherous 12 (along with many other risks not mentioned in the report).

Comments  (0)


The Necessity of Cloud Delivered Integrated Security Platforms

September 28, 2015 Added by:InfosecIsland News

Forrester Consulting conducted an assessment of both integrated security platforms and cloud computing/software-as-a-service (SaaS)-based delivery models. Join SecurityWeek and Zscaler for a compelling webcast full of key insights and findings from this research, including:

Comments  (0)


Cloud Security: It’s in the Cloud - But Where? (Part III)

July 06, 2015 Added by:Steve Durbin

Part III in this series looks at the need to institute a cloud assessment process and the four actions that organizations of all sizes can take to better prepare themselves as they place their sensitive data in the cloud.

Comments  (0)


EBS Encryption: Enhancing the Amazon Web Services Offering with Key Management

July 23, 2014 Added by:Gilad Parann-Nissany

Full disk encryption is becoming more and more popular in cloud settings, and some of the smaller clouds like Google Compute Engine have supported it for a while. Amazon is a bit late to this game, and should lead the way in enabling customer control of encryption keys.

Comments  (1)


Encrypting Data At Rest Or In The Cloud: Is It Value Adding?

October 16, 2013 Added by:Hani Banayoti

Consider encryption at rest but make informed decisions about its value and protection afforded.

Comments  (2)


Five Questions Boards of Directors Need to Ask About Cloud Governance

May 01, 2013 Added by:InfosecIsland News

ISACA has issued new guidance outlining key questions for boards of directors to ask to ensure their enterprise’s cloud initiative is in line with business objectives and the organization’s risk tolerance.

Comments  (1)


Top 10 Encryption Benefits

April 30, 2013 Added by:Steve Pate

If deployed correctly, encryption does not need to be a headache. Instead, encryption can be an enabler to achieve the flexibility, compliance and data privacy that is required in today’s business environments. Below are top 10 benefits for those considering encryption.

Comments  (0)


Cracking WPA Protected WiFi in Six Minutes

January 18, 2011 Added by:Dan Dieterle

Security researcher Thomas Roth says with his brute force program he was able to break into a WPA-PSK protected network in about 20 minutes. And with recent updates to the program, the same password would take about 6 minutes...

Comments  (9)

Most Liked