Content Vault : Security | Recommended Content
Business Issues, Technology, Cloud, Converged Infrastructure, Security

A five step journey to the cloud

Do not rush your cloud implementation.

Blog-post by,
HP Blogger
,

While getting into the cloud fast can seem attractive, a deliberate step-by-step approach is the wisest course. Rushing to the cloud without considering all its implications is not a good idea. So here are five steps to consider as you evaluate cloud options.  

Step 1: Standardize and Consolidate

(1) (1)

Business Issues, Technology, Mobility, Security

5 Ways Employees Create Security Risks for Businesses

Blog-post by,

The Target, Inc. data hack, the Heartbleed Bug---these and other security breaches serve as stark reminders for businesses of the very real risks of doing business in a web-connected world. On the upside, these high-profile hacks reinforce the dangers of cyber-attacks from without. But on the downside, they tend to distract organizations from focusing on mounting security risks caused by their own employees from within.

(6)
   
(1) (1)

Business Issues, Technology, Applications, Big Data, Cloud, Mobility, Security

Six Things Every CEO Should Know About Cybersecurity

Blog-post by,
SteveDurbin

The importance of cyber security is no secret to anyone who watches the nightly news or, in this day and age, has attended a board meeting. Senior executives at businesses of all sizes understand that the global economy is still not adequately protected against cyber-attacks, despite years of effort and annual spending in the multi-billion dollar range.

(2) (2)

Business Issues, CIO Leadership, Applications, Converged Infrastructure, Security

Do you have an internet management policy?

Blog-post by,
ajaludi

Regardless of whether your organization is using cloud based or in-house solutions, your organization should have an internet management policy. This is especially true for new startups that interact with customers via the internet in one form or another.

(3)
   
(2) (2)

Business Issues, CIO Leadership, Technology, Applications, Big Data, Cloud, Converged Infrastructure, IT Performance, Mobility, Security, Services

Cloud Security for Rational Leaders: A Practical Approach for the C-Suite

Blog-post by,
Chris Patterson

News headlines are filled with enough stories about compromised data security to drive executives away from networked and cloud solutions and back to the proverbial days of stuffing cash in a mattress. However, effective leaders recognize that threats to a computing environment are always present, and believe a more fruitful approach to operate a secure organization is to direct their IT teams to manage against real – not simply perceived – threats.

Rational vs. Irrational Fears

(2) (2)

Business Issues, Technology, Cloud, Security

Constantly monitoring third party providers is critical

AT&T April breach is why you should insist cloud providers track their employees.

Blog-post by,
Community Manager
,
jdodge

On the surface, your cloud providers could appear to have the best logical and physical security in the world, but it's all for naught if they have untrustworthy employees. AT&T and its customers just learned that the hard way in an April records breach.

AT&T, dinged for delaying the public disclosure of the breach until last Friday, issued the following statement to reporters, according to coverage of the incident at CIO.com.

(2) (2)

Business Issues, Technology, Security

"How to steal $60 million in 60 seconds"

"Think like the bad guy." HP Discover session details how cyber criminal plan attacks.

Blog-post by,
HP Blogger
,

Think like the bad guy. That will be the advice from several HP experts in the HP Discover session “How to steal $60 million in 60 seconds.”

(2)
   
(2) (2)

Business Issues, Technology, Big Data, Cloud, Security

The hidden costs of cloud computing

Duplicated and synchronized data not necessary

Blog-post by,
HP Blogger
,
Christian

Family photos are a staple in my family. I've taken lots of them on trips and special occasions. 

My conversion from film to digital occurred 15 years ago and I've scanned about 350 GB worth of print photos on my system. I have multiple copies on separate drives and a number of them have been burned on DVDs. But you know, I don’t want to lose the family history. So, I finally decided to keep an extra copy in the cloud. I should have done that a long time ago, but you know how these things go.

(6)
   
(1) (1)

CIO Leadership, Big Data, Security

When Behavioral Analytics Meets Data Security

There's a new math-based method to identify threats to an organization. Understanding how it works can help us sift through the volumes of false positives and identify previously hidden threats.

Blog-post by,

Many security experts are now examining how mathematical models can be developed that determine baseline behavior across users and machines, detecting and surfacing anomalous and risky activities, and even anticipating threats before they happen. This is the promise of behavioral analytics when applied to data security. In practice, a proper implementation of the underlying mathematics and science must be combined with an ability to observe all the user and machine behaviors in real-time.


CIO Leadership, Technology, Applications, Cloud, Security

Customer indemnification catching on the in the cloud

Indemnifying customers against data loss or the prospect of legal action is becoming standard in the enterprise.

Blog-post by,
Community Manager
,

Indemnification is word that's spreading in the cloud community.

(1)
   
(3) (3)