Identity as a service (IDaaS) is more important than ever

Conspiracy theorists and other concerned citizens will insist the government is watching every keystroke, keeping a record of every website, transaction, text and email. Shades of 1984’s Big Brother, right? These last few weeks, the news has been brimming with revelations of data surveillance and monitoring by the government (not to mention data harvesting corporations like Google, Yahoo, Facebook etc…). Everyone is sensitive as to what is being looked at, stored, and analyzed for hazily defined purposes. Privacy is no longer as private as you...

By Cloud Security, 17 June 2013, 0 comments. Categories: Applications, ERP, Security.

7 causes of security paralysis and cloud-based cures

Over and over again we are pummeled with statistics on how risk is growing in disproportion to security readiness.

-91% of companies have experienced at least one IT security event from an external source.

-90% of all cyber crime costs are those caused by web attacks, malicious code and malicious insiders.

-40% reported rogue cloud issues (shadow IT) experienced the exposure of confidential information as a result

-34% share passwords with their co-workers for applications like FedEx, Twitter, Staples,...

By Cloud Security, 23 May 2013, 0 comments. Categories: Adoption, Best Practice, Security.

Brass tacks: Answering the security questions that matter

Enterprise security can be a labyrinthine, complex beast with many moving parts, dozen upon dozen of requirements, needs, implications, options and alternatives.

But when we get down to the nitty gritty (the brass tacks if you will), security can be simplified by six simple questions:

WHO is logging in?

WHAT are they accessing/viewing?

WHERE is the device from which that person logs in?

WHEN was any asset changed/modified/moved

HOW are they authorised/credentialed?

WHAT is the impact of the event?

Now determining the answers to those questions might require a bit of...

By Cloud Security, 23 April 2013, 0 comments. Categories: Architecture, Enterprise, Infrastructure, Security.

Supporting CIO strategies and priorities from the cloud-Part 1

CIO strategyThe biggest eye-opener in Gartner’s recently-published study on the current agenda regarding the digital landscape for Chief Information Officers is that CIO’s recognize that cloud computing will not only be a significant part of the future, but that their own roles and behavior need to be updated to survive...

By Cloud Security, 19 February 2013, 0 comments. Categories: CIO.

How cloud security balances risk versus reward

riskrewardI spend a great deal of my day thinking about security. How it affects the enterprise; how to best position and protect assets. How it shapes risk management and how it delivers potential benefits through smoother operations, enhanced trust and loss prevention.

At its core, security is...

By Cloud Security, 04 January 2013, 0 comments. Categories: Security.

Preventing data leakage: Proactive security from the cloud

In business, data is currency. It is the oil that keeps the commercial engine in motion and databases are the digital banks that store and retrieve this valuable information. And, according to IDC, data is doubling every two years. But as the overall amount of data grows, so does the amount of sensitive and regulated data. All this data...

By Cloud Security, 15 November 2012, 0 comments. Categories: Big Data, Security.