July 15, 2016
By Jim Reavis, Co-founder and CEO, Cloud Security Alliance As cloud computing and unmanaged endpoints continue to gain traction, it is a foregone conclusion that information security technical controls must become more virtual – that is to say, software-based. Rapidly disappearing are the days of physical perimeters and hardwired network...
July 15, 2016
By Mark Wojtasiak, Director of Product Marketing, Code42 Gartner’s June 2016 article, “Use These Five Backup and Recovery Best Practices to Protect Against Ransomware,” outlines five steps for mitigating the threat and/or risk of being hit with ransomware. I will spare you the market stats and dollar figures intended to scare you into taking action...
July 12, 2016
By Marshall England, Industry Marketing Director, Technology & Cloud, Coalfire If you’re an organization with trans-Atlantic presence that transmits and stores European citizen data (e.g. employee payroll & HR data, client & prospect data) in the U.S. you will want to pay attention. What we will discuss was administered under the...
July 11, 2016
By Jane Melia, VP/Strategic Business Development, QuintessenceLabs “If your security sucks now, you’ll be pleasantly surprised by the lack of change when you move to cloud.” — Chris Hoff, Former CTO of Security, Jupiter Networks The chances are, almost everyone in your organization loves the convenience of the cloud for data storage...
July 07, 2016
Rolf Haas, Enterprise Technology Specialist/Network Security and Content Division, Intel Security Cloud use continues to grow rapidly in the enterprise and has unquestionably become a part of mainstream IT – so much so that many organizations now claim to have a “cloud-first” strategy. That’s backed up by a survey* we...
July 06, 2016
By Peter Wood, Cyber Security Consultant, Code42 Boring training videos, box-ticking to meet regulations, blacklisting software at the expense of productivity: large enterprise has been reliant on these methods of “cyber security control” for too long. They are outdated and don’t work. Cyber criminals don’t follow the steps outlined in a...
July 01, 2016
By Abel Sussman, Director, TAAS–Public Sector and Cyber Risk Advisory, Coalfire The Federal Risk and Authorization Management Program (FedRAMP) Project Management Office officially released its High baseline for High impact-level systems. This baseline is at the High/High/High categorization level for confidentiality, integrity, and availability in accordance with FIPS 199; and is mapped...
June 29, 2016
Percentage of Enterprise Computing Workloads in the Public Cloud Expected to Reach 41.05% This Year By Cameron Coles, Director of Product Marketing, Skyhigh Networks Industry analyst firm Gartner predicts that the infrastructure as a service (IaaS) market will grow 38.4% in 2016 to reach $22.4 billion by the end of the year....
Read the blog