Blog Posts Tagged with "Cloud"
April 06, 2017 Added by:John Martinez
There are some factors to take into consideration that may make compliance in the cloud a bit more challenging
May 03, 2016 Added by:Ganesh Kirti
We looked at how well CASBs would fare in helping enterprises survive the treacherous 12 and guess what? CASBs clearly address nine of the treacherous 12 (along with many other risks not mentioned in the report).
September 28, 2015 Added by:InfosecIsland News
Forrester Consulting conducted an assessment of both integrated security platforms and cloud computing/software-as-a-service (SaaS)-based delivery models. Join SecurityWeek and Zscaler for a compelling webcast full of key insights and findings from this research, including:
July 06, 2015 Added by:Steve Durbin
Part III in this series looks at the need to institute a cloud assessment process and the four actions that organizations of all sizes can take to better prepare themselves as they place their sensitive data in the cloud.
July 23, 2014 Added by:Gilad Parann-Nissany
Full disk encryption is becoming more and more popular in cloud settings, and some of the smaller clouds like Google Compute Engine have supported it for a while. Amazon is a bit late to this game, and should lead the way in enabling customer control of encryption keys.
October 16, 2013 Added by:Hani Banayoti
Consider encryption at rest but make informed decisions about its value and protection afforded.
May 01, 2013 Added by:InfosecIsland News
ISACA has issued new guidance outlining key questions for boards of directors to ask to ensure their enterprise’s cloud initiative is in line with business objectives and the organization’s risk tolerance.
April 30, 2013 Added by:Steve Pate
If deployed correctly, encryption does not need to be a headache. Instead, encryption can be an enabler to achieve the flexibility, compliance and data privacy that is required in today’s business environments. Below are top 10 benefits for those considering encryption.
January 18, 2011 Added by:Dan Dieterle
Security researcher Thomas Roth says with his brute force program he was able to break into a WPA-PSK protected network in about 20 minutes. And with recent updates to the program, the same password would take about 6 minutes...
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015