Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
Cloud Security Considerations

Published: 11/14/2011

Can a cloud be as secure as a traditional network?  In a word, yes!  I agree that some may find this statement surprising.  Depending on the network, that may be a low bar, but good security principles and approaches are just as applicable to cloud environments as they are to traditional network ...

Leveraging Managed Cloud Services to Meet Cloud Compliance Challenges

Published: 11/04/2011

By Allen Allison   Regardless of your industry, customer base, or product, it is highly likely that you face regulatory compliance requirements.  If you handle Protected Health Information (PHI), the Health Insurance Portability and Accountability Act (HIPAA) – along with the HITECH enhancement...

Cloud Security: Confident, Fearful, or Surprised

Published: 11/04/2011

By Ken Biery   This two-part guest blog series explores the topic of cloud security.  Part one of the series focuses on the questions enterprise IT decision makers should ask when considering moving business applications to a cloud-based computing environment.     There is no shortage of inf...

Test Accounts: Another Compliance Risk

Published: 10/07/2011

By: Merritt Maximi A major benefit associated with deploying identity management and/or identity governance into an organization is that these solutions provide the ability to detect and remove orphan accounts.  Orphan accounts refer to active accounts belonging to a user who is no longer involv...

When It Comes To Cloud Security, Don’t Forget SSL

Published: 09/30/2011

By Michael Lin, Symantec   Cloud computing appears here to stay, bringing with it new challenges and security risks on one hand, while on the other hand boasting efficiencies, cost savings and competitive advantage. With the new security risks of cloud and the mounting skill and cunning of toda...

Securing Your File Transfer in the Cloud

Published: 09/30/2011

By Stuart Lisk, Sr. Product Manager, Hubspan Inc.  File transfer has been around since the beginning of time. Ok, well maybe that is an exaggeration, but the point is, file transfer was one of the earliest uses of “network” computing dating back to the early 1970’s when IBM introduced the floppy ...

CSA Blog: The “Don’t Trust Model”

Published: 09/14/2011

By Ed King The elephant in the room when it comes to barriers to the growth and adoption of Cloud computing by enterprises is the lack of trust held for  Cloud service providers.  Enterprise IT has legitimate concerns over the security, integrity, and reliability of Cloud based services.  The ...

Seven Steps to Securing File Transfer’s Journey to the Cloud

Published: 09/12/2011

By Oded Valin, Product Line Manager, Cyber-Ark Software   “When it absolutely, positively has to be there overnight.”  There’s a lot we can identify with when it comes to reciting FedEx’s famous slogan, especially as it relates to modern file transfer processes. When you think about sharing hea...

Five Ways to Achieve Cloud Compliance

Published: 08/26/2011

With the rapid adoption of cloud computing technologies, IT organizations have found a way to deliver applications and services more quickly and efficiently to their customers, incorporating the nearly ubiquitous utility-like platforms of managed cloud services companies.  The use of these cloud ...

Cloud Hosting and Security Demystified

Published: 08/16/2011

I am always amazed when I read the daily cloud blogs, articles and news headlines. Any given day will bring conflicting points of view by cloud industry experts and pundits on how secure clouds are, both private and public.  There never seems to be a real consensus on how far security in the clou...

Cloud Signaling – The Data Center’s Best Defense

Published: 07/27/2011

By Rakesh Shah, Director, Product Marketing & Strategy at Arbor Networks Recent high-profile security incidents heightened awareness of how Distributed Denial of Service (DDoS) attacks can compromise the availability of critical Web sites, applications and services.  Any downtime can result ...

Pass the Buck: Who 's Responsible for Security in the Cloud?

Published: 07/27/2011

Cloud computing changes the equation of responsibility and accountability for information security and poses some new challenges for enterprise IT. At Vormetric we are working with service providers and enterprises to help them secure and control sensitive data in the cloud with encryption, which...

PKI Still Matters, Especially in the Cloud

Published: 07/15/2011

By:  Merritt Maxim Director of IAM Product Marketing CA Technologies Inc. Infosec veterans probably remember (with a smirk) how Public Key Infrastructure (PKI) was heralded as the next “big thing” in information security at the dawn of the 21st century.  While PKI failed to reach the broad ado...

Understanding Best-in-Class Cloud Security Measures and How to Evaluate Providers

Published: 07/11/2011

By Fahim Siddiqui Despite a broader interest in cloud computing, many organizations have been reluctant to embrace the technology due to security concerns. While today’s businesses can benefit from cloud computing’s on-demand capacity and economies of scale, the model does require they relinquis...

Watch Out for the Top 6 Cloud Gotchas!

Published: 07/11/2011

By Margaret Dawson, VP of Product Management, Hubspan I am a huge proponent of cloud-based solutions, but I also have a bailiwick for people who look to the cloud just for cloud’s sake, and do not take time to do the due diligence.  While the cloud can bring strong technical, economic and busine...

How Public Cloud Providers Can Improve Their Trustworthiness

Published: 06/16/2011

By Matthew Gardiner When you meet someone you have never met for the first time, in a place you have never been to, do you trust him?  Would you have him hold your wallet for you or would you share some sensitive personal information with him?  Of course not. Obviously this person is not trusted...

Security Standards – Why they are so Critical for the Cloud

Published: 05/13/2011

By Matthew Gardiner Everyone loves standards, right?  When is the last time you heard a vendor proudly say that their product or service was closed and proprietary?  However, it also seems that every time a new IT architecture sweeps through the market, this time one based on cloud models, the l...

OAuth - authentication & authorization for mobile applications

Published: 05/06/2011

By Paul Madsen Federation is a model of identity management that distributes the various individual components of an identity operation amongst different actors. The presumption being that the jobs can be distributed according to which actors are best suited or positioned to take them on. For ...

Who Moved My Cloud

Published: 05/04/2011

by Allen Allison, Chief Security Officer at NaviSite (www.navisite.com) Managed cloud services are quickly being adopted by large enterprises. Organizations are increasingly embracing cloud technologies for core services like financial systems, IT infrastructure, online merchant sites, and messa...

Cloud Computing and Device Security: The “Always Able” Era

Published: 04/29/2011

By Mark Bregman, CTO of Symantec Device Proliferation: Mobility and Security in the Cloud Chief Information Security Officers know instinctively that the world under their purview is undergoing a shift every bit as significant as the rise of the World Wide Web more than 15 years ago. The demand...

Browse by Topic