Preventing Data Leakage: Proactive Security from the Cloud
In business, data is currency. It is the oil that keeps the commercial engine in motion and databases are the digital banks that store and retrieve this valuable information. And, according to IDC,...
View ArticleWhen is a stack not a stack? When it’s Unified in the cloud
While trawling the blogs, feeds and news I came across an analyst’s article about best security practices in which he kept referring to “the stack.” And by this he meant a multitude of various...
View ArticleIt’s a Wonderful Cloud-a Security Carol
It’s not Wordsworth, but hopefully worth the words. Happy holidays to all of you and thank you for reading. May the season keep your perimeters protected, your assets secure and your networks free of...
View ArticleHow cloud security balances risk versus reward
I spend a great deal of my day thinking about security. How it affects the enterprise; how to best position and protect assets. How it shapes risk management and how it delivers potential benefits...
View ArticleThe New Standard: Intelligence-Driven Security
In his most recent blog post, Art Coviello, the executive chairman at RSA posed an important question. How do we move from traditional security to intelligence-driven security? In his answer he...
View ArticleSailing the 7 C’s of security monitoring
What is it your mom used to say? “A watched pot never boils.” This might be true, but a watched pot also never spills; it never allows your younger sister to stick her hand in the hot water; prevents...
View ArticleSupporting CIO strategies and priorities from the cloud-Part 1
The biggest eye-opener in Gartner’s recently-published study on the current agenda regarding the digital landscape for Chief Information Officers is that CIO’s recognize that cloud computing will not...
View ArticleSupporting CIO strategies and priorities from the cloud-Part 2
This is the second part of a two-part article entitled Supporting CIO Strategies and Priorities from the Cloud. In case you have not done so, READ PART 1. However, to briefly recap: in support of a...
View ArticleCloud-based SIEM frees that one hand tied behind your back
Have you ever been asked to fight the state boxing champion with one hand tied behind your back? Or metaphorically experience the old adage of bringing a knife to a gunfight? Many security...
View Article
More Pages to Explore .....