Providing Insight Into the Cloud Computing Security, Privacy and Related Threats

Cloud Security Journal

Subscribe to Cloud Security Journal : eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Cloud Security Journal : homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Articles from Cloud Security Journal
“As the move to the cloud started, we stayed ahead of that by providing security solutions to our enterprise customers, financial customers, and now a whole new range of customers, which are application developers," explained John Gunn, VP of Corporate Communications for VASCO Data Sec...
This article explores how to detect fraud among online banking customers in real-time by running an ensemble of statistical and machine learning algorithms on a dataset of customer transactions and demographic data. The algorithms, namely Logistic Regression, Self-Organizing Maps and S...
VASCO Data Security International, Inc., announced it has sold its 200 millionth DIGIPASS authenticator. The milestone follows the company's recent announcement of record order intake in Q1 of 2014. "Global criminal hacking organizations pose a growing threat to our banking and enterp...
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in – unannounced and unnoticed. By the time these thieves get in, t...
In many industries, cloud computing is now vital to remaining competitive. The cloud typically offers superior flexibility, scalability, accessibility, and high availability, enabling businesses to grow more agile and responsive. Regulatory compliance concerns often make banks and othe...
In 2013, the total cost of natural disasters reached $192 billion, according to recent research from Impact Forecasting, a division of reinsurance company Aon Benfield, who conducts these reports each year. In 2012, Hurricane Sandy topped 2013’s most costly natural disaster. With dam...
Electronic signatures are an important component of any web application. They make it possible to keep business processes online even when a signature is required on a contract, form or application. If you are interested in learning how to quickly integrate e-signatures into your cloud...
SYS-CON Events announced today that VASCO Data Security International, Inc., a global leader in authentication, digital signatures, and identity management, has been named “Bronze Sponsor” of SYS-CON's 14th International Cloud Expo®, which will take place on June 10–12, 2014, at the Ja...
As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. Enterprises must protect their data from (1) system administrators who don’t need to see the data in the clear and (2)...
Like electricity, compute resources can readily scale up and burst, and workloads can easily operate geographically. Storage however is more like water, where moving large amounts of data can be very challenging, especially over distance. In his session at 14th Cloud Expo, Joe Arnold...
When it comes to protecting an IT investment, a natural choice today is to leverage a cloud technology. In his session at 14th Cloud Expo, Rick Vanover, Product Strategy Specialist at Veeam Software, will discuss how you can start to engage one or more cloud technologies for your dat...
“While cost has traditionally been a foundational benefit of the cloud, we believe that other factors can play a more important part in defining the cloud of tomorrow,” said Todd Gleason, Vice President of Technology at FireHost, in this exclusive Q&A with Cloud Expo conference chairs ...
Risk-conscious enterprises across the globe have been reluctant to embrace the public cloud model. For many, compliance requirements are the source of the reluctance. For others, concerns about ceding control of their data to a cloud service provider, without the cloud service provider...
Last month, the Information Security Forum released their annual prediction of the top 10 information security threats they foresee for the next two years – through 2016. While I found the entire list insightful, half of the list resonated strongly with me as someone who is working wit...
For Windows environments, it is critical that organizations can delegate administration and establish granular privileges quickly and efficiently to restrict administrators so they only access the servers and resources required to perform their job and only during the approved times to...
There are two pieces of good news to come out of Heartbleed. First, we haven’t heard of any significant security breaches, which mean that the industry as a whole is getting better at fixing problems as they arise. The second is that, because Heartbleed presented every single cloud pr...
One challenge more and more enterprises are grappling with as they plan to adopt the cloud is data residency & sovereignty. They are finding that if they want to use a cloud service hosted outside of their borders, life can become quite complex. Perhaps it is a result of the often disc...
Every company worries about competition. When I ran a large enterprise solutions organization, I took steps every day to ensure we were outpacing the competition. Frequently this involved making “build” vs “buy” decisions for the various product parts or services we needed to drive our...
As recent events have confirmed once again, no single company, organization or government is up to the task of securing the Internet. The never-ending cat and mouse game of exploits chasing vulnerabilities continues. The stunning Heartbleed discovery has shaken the online security esta...
Enterprises are moving more and more applications to the cloud. Gartner predicts that the bulk of new IT spending by 2016 will be for cloud computing platforms and applications and that nearly half of large enterprises will have cloud deployments by the end of 2017.1 The far-reaching...
The cloud computing revolution is well underway and there are lots of benefits to be realized. According to Awesome Cloud research the industry will be worth more than $150 billion this year, compared to $46 billion just six years ago. Mirroring the general trend for SaaS solutions, cl...
Cloud computing security can be a conundrum. The point of using the public cloud is to outsource certain infrastructure and application needs to third party providers, after all. How can you secure your data once it leaves your perimeter and your control? As puzzling as it may seem, th...
While Big Data and the cloud are often thought of as going hand in hand, some enterprises still hesitate to place large amounts of proprietary data online. Enterprises decide to keep their large data sets stored locally for a variety of reasons including the possibility of security bre...
SYS-CON Events announced today that BUMI, a premium managed service provider specializing in data backup and recovery, will exhibit at SYS-CON's 14th International Cloud Expo®, which will take place on June 10–12, 2014, at the Javits Center in New York City, New York. Manhattan-based ...
Chief Security Officers (CSO), CIOs and IT Directors are all concerned with providing a secure environment from which their business can innovate and customers can safely consume without the fear of Distributed Denial of Service attacks. To be successful in today's hyper-connected worl...
Zetta.net is an enterprise-grade backup and disaster recovery provider. We have been in business for over five years, and we have over 800 enterprise customers and managed service providers (MSPs) that use or resell our product, as is the case with MSPs. In terms of the IT challenges,...
Cloud and Big Data present unique dilemmas: embracing the benefits of these new technologies while maintaining the security of your organization’s assets. When an outside party owns, controls and manages your infrastructure and computational resources, how can you be assured that sensi...
As organizations continue expanding their adoption of the public cloud, many IT and security professionals are beginning to see that they need improved cloud-monitoring and cloud-auditing capabilities. By cloud monitoring, I’m referring to the process of identifying cloud use within an...
Cobbling together point solutions provides tools, but doesn't promote the key collaborative intelligence integrated cloud-based unified security offers. Of all the strategies and tactics available to prevent breaches, deter data leakage and theft, control access and secure beyond the ...
Virtualized and private cloud infrastructures are all about sharing resources – compute, storage and network. Optimizing these environments comes down to the ability to properly balance capacity supply and application demand. In practical terms, this means allocating the right amount o...
Cloud computing brings a myriad of benefits for any enterprise, but it is also a cause for concern in a world where, according to InformationWeek, cyber criminals are now targeting "any company where they can find data to resell, disrupt or exploit." Moving your company's sensitive da...
The evolutionary nature of mobile presents a security-centric challenge for businesses with corporate content on these devices. Enterprises put themselves at risk when users access sensitive information through email and applications across smartphones and tablets, while mobile. Organi...
DocuSign on Tuesday announced the company has raised an additional $85 million with the vast majority from large institutional public funds and the balance from existing investors. DocuSign will use the funds to fuel continued growth as the global standard for Digital Transaction Manag...
IBM has announced a unique new development environment and capabilities-as-a-service to help clients and developers speed the adoption of "hybrid" clouds, which have the potential to usher in a new era of innovation across the enterprise. As part of its initiative, IBM has invested mor...
AccelOps on Thursday announced its global survey of 140 IT security professionals found that while cloud usage continues to rise, cloud security remains stagnant. Results indicate that 73 percent of survey respondents are running a greater number of mission-critical applications in the...
Recent high-profile events (2010 Haitian Earthquake, 2011 Tōhoku Earthquake and Tsunami, 2013 Typhoon Haiyan/Yolanda) have highlighted the growing importance played by the international community in successful humanitarian assistance and disaster response. These events also showcased t...
Rob Wigley is Director, Cybersecurity Consulting Services at HP Enterprise Services, U.S. Public Sector. He has more than 30 years of information technology experience supporting manufacturing, high tech, healthcare, and public sector market segments. For the last 10 years, he has focu...
How can your business benefit from using the cloud? We hear the term all the time in the tech world, but it's never really clearly defined. Those of us who are using social media or saving data with online sources are already using it. Perhaps you just didn't know it. Amazon is one of ...
Expand on-premise identity management capabilities by utilizing the flexibility and agility of an IDaaS and SSO to augment permissions for cloud-based apps. The modern enterprise is a fluid entity. As an IT construct it expands and contracts (sometimes simultaneously), and many of the...
Global information technology networks that are rich in services are typically complex and require hard-to-manage security solutions. The latest versions of next-generation firewalls now offer multiple security layers that can complicate management, particularly as more and more featur...