7 causes of security paralysis and cloud-based cures
-91% of companies have experienced at least one IT security event from an external source.
-90% of all cyber crime costs are those caused by web attacks, malicious code and malicious insiders.
-40% reported rogue cloud issues (shadow IT) experienced the exposure of confidential information as a result
-34% share passwords with their co-workers for applications like FedEx, Twitter, Staples,...
Brass tacks: Answering the security questions that matter
But when we get down to the nitty gritty (the brass tacks if you will), security can be simplified by six simple questions:
WHO is logging in?
WHAT are they accessing/viewing?
WHERE is the device from which that person logs in?
WHEN was any asset changed/modified/moved
HOW are they authorised/credentialed?
WHAT is the impact of the event?
Now determining the answers to those questions might require a bit of...
A de-provisioning proverb: When a door closes, make sure you don’t leave a window open
Supporting CIO strategies and priorities from the cloud - Part 2
This is the second part of a two-part article entitled Supporting CIO Strategies and Priorities from the Cloud. In case you have not done so, READ PART 1.
However, to briefly recap: in support of a recent Gartner study that...
Supporting CIO strategies and priorities from the cloud-Part 1
The biggest eye-opener in Gartner’s recently-published study on the current agenda regarding the digital landscape for Chief Information Officers is that CIO’s recognize that cloud computing will not only be a significant part of the future, but that their own roles and behavior need to be updated to survive...
The new standard: Intelligence-driven security
In his most recent blog post, Art Coviello, the executive chairman at RSA posed an important question. How do we move from traditional security to intelligence-driven security? In his answer he described that the quickly...
How cloud security balances risk versus reward
It’s money that matters in the cloud…well, at least ROI
When is a stack not a stack? When it’s Unified in the cloud
Why governance must drive all security initiatives…even cloud
I heard these sage words at a recent ISSA (Information Systems Security Association) meeting from a CIO speaking about security from the cloud.
Preventing data leakage: Proactive security from the cloud
In business, data is currency. It is the oil that keeps the commercial engine in motion and databases are the digital banks that store and retrieve this valuable information. And, according to IDC, data is doubling every two years. But as the overall amount of data grows, so does the amount of sensitive and regulated data. All this data...