cybersecurity

SaaS vendors, customers, finding new ways to secure the cloud

Rogue employees, hackers, government employees all threats to keeping information stored on the cloud private Edward Snowden’s leaks about NSA spying may have brought the issue of cloud security to broad public attention, but some enterprise users were already concerned about how to take advantage of cloud-based applications while keeping their data safe. As a […]

SaaS vendors, customers, finding new ways to secure the cloud Read More »

Security Keys

What treasury and finance executives need to know about encryption Treasury and finance executives need to know enough about encryption and security to  ensure that those policies not only match the company’s general attitude towards risk, but  also account for particular risks associated with certain departments and processes. Encryption is a good safety measure because

Security Keys Read More »

Cloudy Outlook

Cloudy Does the cloud help or  hinder credit card payment  security and compliance? Depending on whom you ask, processing  credit card payments in the cloud is either  a great leap forward for security and  compliance, or a big step backward. Actually, it can be  either–depending on the type of cloud you have in  mind and

Cloudy Outlook Read More »

Bitcoin: Seven reasons to be wary

Of all the virtual currencies out there, BitCoin is the most interesting from a technical perspective – and the least interesting from the business point of view. BitCoin is a peer-to-peer virtual currency that uses cryptography to control the creation and transfer of money. Unlike all other currencies, BitCoin is completely independent. “It is company

Bitcoin: Seven reasons to be wary Read More »

Virtual Worlds, Real Risks

Online communities and collaborative workspaces create operational and security vulnerabilities — but also opportunities to  deploy enterprise-grade, risk-based solutions. Carroll University’s library commons was a victim of its own success. The commons — which takes up an entire floor of  the library building — is a place where students gather and collaborate, get supplemental instruction

Virtual Worlds, Real Risks Read More »

Cyber Security Review

As threats proliferate, here are five areas where companies need to strengthen and update their policies and practices. It’s particularly galling when a company specializing in security issues gets monumentally hacked. That was the case for Stratfor, which suffered a massive data breach just before the holidays that exposed thousands of client names, e-mail addresses […]

Cyber Security Review Read More »

How to Survive a Cloud Outage

Amazon’s infamous cloud outage in April brought down a number of popular Web sites, including foursquare and Reddit – but many of Amazon’s enterprise cloud customers were able to weather the storm without experiencing downtime. They architected their systems for resiliency by using multiple availability zones, having hot backups in traditional data centers, or having

How to Survive a Cloud Outage Read More »