Cybersecurity Blog: The Cyber Scene is evolving, are you?

Part Three: Critical Cloud Security Threat Trends

Cloud computing is dominating business IT more each day. Industry leaders should be focused on education and on addressing these nine critical threats to cloud security:

Read more

Part Two: Legal Framework

This is part two of a three-part approach to examination of the trends in cloud computing. Part one is reviews the differences in industry approach; part two examines the legal framework of the technology; and part three addresses threat trends in cloud security.

Read more

This is a three-part approach to examination of the trends in cloud computing. Part one is Differences in Industry Approach, part two examines the legal framework of the technology, and part three addresses threat trends in cloud security.

Read more

Enterprise-wide network security is getting a lot of attention. Countless whitepapers, conferences and presentations focus on cybersecurity, but a fundamental element is being ignored.

Read more

7 Legal Framework Trends IT Professionals Need to Evaluate

As a start, these leaders should evaluate IT operations across these seven Business Software Alliance recommended areas:

1. Ensuring privacy: Buttressing users’ faith that their information will not be used or disclosed in unexpected ways. At the same time, to maximize the benefit of advanced information technology, providers must be free to move data internationally in the most efficient way.

Read more

Each year, the Internet of Things (IoT) makes strides towards transforming industries. IoT, or as it’s sometimes known as the Internet of Everything (IoE), are physical devices that placed on the Internet by installing wireless sensors on them. You see a lot of IoT in the consumer world, most commonly in home devices such as alarm systems, thermostats and electrical sockets to control lights remotely. Most of these devices are accessed by apps on your mobile device.

Read more

The “consumerization” of business technology is a relatively recent trend that continues to pick-up speed. Defined as the introduction of consumer technology within the corporate environment and for the use of work activities, the consumerization of business technology is best reflected in policies such as Bring Your Own Device (BYOD), which have become prevalent in most corporate environments.

Read more

1411572992200

A hybrid cloud is a consolidation of a private cloud and a public cloud. The reason for their growing popularity stems from their ability to offer multiple deployment models at once. Gartner predicts that globally, almost half of all large enterprises will have deployed hybrid clouds by the end of 2017.  That means we are in a defining moment wherein companies will begin planning to move away from private into hybrid clouds.

Read more

1411063580206

Last week, we took a look at the current landscape of minorities in cybersecurity and IT with a particular emphasis on women in those fields. Both personally and professionally, I feel that diversity is an important aspect of an effective cybersecurity approach, and can help fill the gap managers have to meet the demands for more talented cyber-professionals in today’s IT environment.

Read more

1409162071669

One emotion few of my peers experience is the feeling of walking into a room and being the only woman - and it didn't matter whether I was visiting a Security Operations Center (SOC), attending a Chief Information Security Forum or meeting with Information Security leaders in various industries.  Meeting after meeting and at all levels, I have concluded that the low numbers of women and minorities working within cybersecurity and across the IT discipline is a concern from a personal standpoint and a business risk that I feel few recognize.

Read more