As security becomes a shared responsibility, the role of chief vendor information security officer (C-VISO) will become a necessity.
A cloud exit plan should be integral part of your organization's cloud strategy in order to increase security and minimize the risks to your business.
Recap of Bruce Schneier's Black Hat keynote, "The State of Incident Response," covering trends in the cyberworld and how threats should be addressed.
The bring your own device (BYOD) trend is probably here to stay, which means companies will need to secure their entire software stack, not just endpoint.
Cloud offerings are becoming a mainstay in Internet resources, but how do we control our cloud data? What is your cloud key management strategy?
Streamlining Identity and Access Management (IAM) for Mobile, Social and CloudImprovements in the digital community have exacerbated the challenges of...
Cloud computing is transforming IT. As with most new technology paradigms, security concerns surrounding cloud computing have become the most widely talked about inhibitor of wide spread usage. To gain the trust of organizations, cloud services must...
Security in public clouds has long been a concern for firms considering migration, but as the technology matures, these concerns are becoming allayed.
With high-profile data breaches appearing increasingly often in the news, organizations must consider identity management in cloud computing services.
In this era of mobile, cloud and social, have you done enough to secure access to your most critical business resources? Security is as strong as its weakest link, and the weakest link these days is people, your users who access your business...