CISO December 17, 2014 Security Technology a Top Focus for CISOs 2 min read - Security leaders are focusing their attention on improving security technology in the face of innovations in the cloud, mobile devices and big data.
December 9, 2014 Security Researchers: Google App Engine May Contain More Than 30 Vulnerabilities 2 min read - Holes in Google App Engine could allow third parties to access or steal information from the company's cloud-based service for hosting Web apps.
December 4, 2014 More Is Less? EMC Study Finds Data Protection Better With One Vendor 3 min read - According to a recent EMC study, data protection is easier and cheaper when organizations partner with one vendor rather than multiple ones.
Cloud Security December 1, 2014 CIC Security Briefing Note: IBM Delivers Dynamic Security for Hybrid Cloud 5 min read - Through its new Dynamic Security strategy, IBM is improving its cloud offerings through a unified architecture, platform, security tools and services.
Identity & Access November 26, 2014 Directory Management for Office 365 Access 3 min read - Small companies contributed to the success of directory management for Office 365 access, Microsoft's cloud subscription application suite.
Cloud Security November 12, 2014 Cloud Security: Protecting Your Enterprise at the Edge 2 min read - To maintain an appropriate level of cloud security, your organization must work to provide a strong security posture at the points of entry.
Intelligence & Analytics November 7, 2014 Identity Management in the Brave New World of Social, Mobile and the Cloud 2 min read - The modern identity management ecosystem must be properly managed as companies increasingly adopt the cloud to access secure data.
Intelligence & Analytics November 4, 2014 Dynamic Security for the Hybrid Cloud: Cloud Is the New Data Center 2 min read - As more organizations adopt the cloud, companies should prioritize their cloud security to keep their critical data safe from cybercriminals.
Intelligence & Analytics October 31, 2014 Internet of Things Era to Rapidly Change Business Processes and Security 4 min read - The era of the Internet of Things is upon us and is changing how companies operate at all levels of business and interact with clients and personnel.
October 24, 2014 Elastica Report: ‘Shadow Data’ an Emerging Threat for Enterprises 2 min read - Unsupervised use of cloud collaboration tools can pose shadow data risks for enterprises, according to a recent report from Elastica.