Cloud Security & the Power of Shared Responsibility

When you and your CSP jointly embrace the shared security responsibility model you can achieve greater success than you or your provider can achieve alone. When you’re a toddler, you think the world revolves around you, and your personal constitution has one word in it: “mine!” As you grow and develop some wisdom, you recognize…

Privacy, security concerns grow for wearables

While Google Glass was not the success Google wanted it to be, there is no doubt that the wearable camera market is growing. People may have not been comfortable with the fact that random persons can record their action without them being aware of it, but most have no trouble with law enforcement agents, first…

Climbing the Security Maturity Ladder in Cloud

These five steps will insure that you achieve the broadest coverage for onboarding your most sensitive workloads. Astute CIOs are actively migrating to public cloud to take advantage of scalability, flexibility and inherent security at a lower cost. As Rob Alexander, CIO Capital One, said at the AWS re:Invent 2015 conference in Las Vegas, “We…

Protecting your cloud from ransomware

For enterprises that use the cloud, the key to being protected starts with understanding the layers that make up the components of their cloud stack. These different layers create multiple potential targets, and for the informed, they each represent a piece of the cloud environment that can be secured against potential threats. Ransomware doesn’t have…

Three cybersecurity threat trends that organizations should address today

The cybersecurity landscape grows seemingly more complex – and dangerous – by the day: Hackers and other bad actors unleash increasingly intricate and formidable attacks, on more mission critical systems. Yet, organizations attempt to counter their threats with the same limited resources. In fact, many industry veterans need to return to the ranks as practitioners…

Cloud-based single sign-on means access and security everywhere

The cloud is now the standard of corporate organizational life. It is a standard practice for nearly every sector of every industry. So, there must be solutions available to help manage these cloud applications. To effectively manage your cloud applications – access security and permissions – is to employ automated account management technology for both…

Don’t forget to pack security for the journey to the cloud

When you move workloads to public cloud platforms, you offload many tasks on the cloud provider, but don’t fall for the misconception that you’re entirely off the hook with security. Although cloud providers “rent” their computing infrastructure to you, they operate on a “shared security responsibility” model, meaning you still must protect your workloads in…

Will most security operations transition to the cloud?

Companies across industries are increasingly leveraging the cloud for security applications, with 42 percent indicating they currently run security applications in the cloud and 45 percent stating they are likely or extremely likely to transition security operations to the cloud in the future, according to Schneider Electric. Organizations utilize the cloud for existing applications including…