Content Vault : Security | Recommended Content
Business Issues, CIO Leadership, Technology, Applications, Big Data, Cloud, Converged Infrastructure, IT Performance, Mobility, Security, Services

Cloud Security for Rational Leaders: A Practical Approach for the C-Suite

Blog-post by,
Chris Patterson

News headlines are filled with enough stories about compromised data security to drive executives away from networked and cloud solutions and back to the proverbial days of stuffing cash in a mattress. However, effective leaders recognize that threats to a computing environment are always present, and believe a more fruitful approach to operate a secure organization is to direct their IT teams to manage against real – not simply perceived – threats.

Rational vs. Irrational Fears

(2) (2)

Business Issues, Technology, Cloud, Security

Constantly monitoring third party providers is critical

AT&T April breach is why you should insist cloud providers track their employees.

Blog-post by,
Community Manager
,
jdodge

On the surface, your cloud providers could appear to have the best logical and physical security in the world, but it's all for naught if they have untrustworthy employees. AT&T and its customers just learned that the hard way in an April records breach.

AT&T, dinged for delaying the public disclosure of the breach until last Friday, issued the following statement to reporters, according to coverage of the incident at CIO.com.

(2) (2)

Business Issues, Technology, Security

"How to steal $60 million in 60 seconds"

"Think like the bad guy." HP Discover session details how cyber criminal plan attacks.

Blog-post by,
HP Blogger
,

Think like the bad guy. That will be the advice from several HP experts in the HP Discover session “How to steal $60 million in 60 seconds.”

(2)
   
(2) (2)

Business Issues, Technology, Big Data, Cloud, Security

The hidden costs of cloud computing

Duplicated and synchronized data not necessary

Blog-post by,
HP Blogger
,
Christian

Family photos are a staple in my family. I've taken lots of them on trips and special occasions. 

My conversion from film to digital occurred 15 years ago and I've scanned about 350 GB worth of print photos on my system. I have multiple copies on separate drives and a number of them have been burned on DVDs. But you know, I don’t want to lose the family history. So, I finally decided to keep an extra copy in the cloud. I should have done that a long time ago, but you know how these things go.

(6)
   
(1) (1)

CIO Leadership, Big Data, Security

When Behavioral Analytics Meets Data Security

There's a new math-based method to identify threats to an organization. Understanding how it works can help us sift through the volumes of false positives and identify previously hidden threats.

Blog-post by,

Many security experts are now examining how mathematical models can be developed that determine baseline behavior across users and machines, detecting and surfacing anomalous and risky activities, and even anticipating threats before they happen. This is the promise of behavioral analytics when applied to data security. In practice, a proper implementation of the underlying mathematics and science must be combined with an ability to observe all the user and machine behaviors in real-time.


CIO Leadership, Technology, Applications, Cloud, Security

Customer indemnification catching on the in the cloud

Indemnifying customers against data loss or the prospect of legal action is becoming standard in the enterprise.

Blog-post by,
Community Manager
,

Indemnification is word that's spreading in the cloud community.

(1)
   
(2) (2)

Business Issues, Technology, Big Data, Security

Data Security & Cyber Privacy: Circumstances Have Changed, and So Should IT

Blog-post by,
KPadir

Lately, it feels like data breaches are making headlines daily. The breaches at Target and Neiman-Marcus, for example, have raised a crescendo of concern that is certainly justified but sometimes a little off base. In particular, there’s confusion over the distinction between online privacy and online security. Some of the commentators have simply been echoing Sun CEO, Scott McNealy’s comments dating back to 1999, suggesting that we all just “get over it” and learn to live without online privacy.

(4)
   
(3) (3)

CIO Leadership, Security

We are all a Target - Operationalizing Enterprise Security

Blog-post by,
Wh1t3Rabbit

You are correct in thinking this blog post title is a play on words. Indeed it is. I mean to say that yes indeed every enterprise is a target in the sense that they are targeted for a breach. I also mean that we, collectively, are all prone to the exact same alleged failure that caused the massive breach at Target.

(1)
   
(3) (3)

Technology, Security

The era of Critical Security Controls (CSC)

SAN 20 CSCs encourage best security practices

Blog-post by,
vijaybasani

As information technology drives automation, improves service delivery and provides direct, positive impacts to top line revenue, information security takes a percentage of that revenue away due to investments in securing sensitive customer and corporate data – often in the form of expensive technology investments, without the proper process and staff required implement and manage it.

(2) (2)

Technology, Cloud, Security

Cloud security fears overblown, but be wary of sloppy SaaS users

Two stories in the past 24 hours offer stark contrast about cloud security.

Blog-post by,
Community Manager
,
jdodge

 Are cloud security fears overblown or understated? I've found two CIO.com stories in the past 24 hours that say yes and yes.

A study from Softchoice says Software as a Service (SaaS) users are "irresponsible' when it comes to security. They're 2x to 10x more careless with passwords and 2x to 16x more casual with file transfers. I take that to mean x times more than non-cloud SaaS users.

(2) (2)