Quantcast
Channel: Cloud Security by CloudAccess.com » REACT
Browsing latest articles
Browse All 15 View Live

Image may be NSFW.
Clik here to view.

Sailing the 7 C’s of security monitoring

What is it your mom used to say? “A watched pot never boils.” This might be true, but a watched pot also never spills; it never allows your younger sister to stick her hand in the hot water; prevents...

View Article



Image may be NSFW.
Clik here to view.

Supporting CIO strategies and priorities from the cloud-Part 1

The biggest eye-opener in Gartner’s recently-published study on the current agenda regarding the digital landscape for Chief Information Officers is that CIO’s recognize that cloud computing will not...

View Article

Image may be NSFW.
Clik here to view.

Supporting CIO strategies and priorities from the cloud-Part 2

This is the second part of a two-part article entitled Supporting CIO Strategies and Priorities from the Cloud. In case you have not done so, READ PART 1. However, to briefly recap: in support of a...

View Article

Image may be NSFW.
Clik here to view.

Cloud-based SIEM frees that one hand tied behind your back

Have you ever been asked to fight the state boxing champion with one hand tied behind your back? Or metaphorically experience the old adage of bringing a knife to a gunfight? Many security...

View Article

Image may be NSFW.
Clik here to view.

Maneuvering though the IT Threatscape: A video blog

I was fortunate to receive an invitation to speak at the recent 2013 Credit Union InfoSec Conference in Las Vegas. One of the key drivers for many of the attendees is the burden of compliance and...

View Article


Image may be NSFW.
Clik here to view.

Synchronization enforces control for cloud integrated IDaaS and Access...

When Olympic rowers glide across the water’s surface at speeds of more than 25 mph, it’s because all the crew are in synch with one another. It’s a collaborative effort. As appropriate…if you are of a...

View Article

Image may be NSFW.
Clik here to view.

Analyzing the Top 10 benefits of Unified Security from the cloud (Part 1)

Of all the strategies and tactics available to prevent breaches, deter data leakage and theft, control access and secure beyond the so-called network perimeter, the one that is emerging as an...

View Article

Image may be NSFW.
Clik here to view.

Analyzing the Top 10 benefits of Unified Security from the cloud (Part 2)

If you missed Part 1: read it HERE More than security from the cloud, the concept of unified security takes the method another step forward in terms of best practices—the ability to deploy a holistic...

View Article


Unified Security: Avoid becoming a statistic

http://www.cloudaccess.com/blog/wp-content/uploads/2013/10/CloudAccess_UnifiedSecurity_wmv.wmv Take 3 minutes to learn why this best practice is not only the next evolutionary step in IT security...

View Article


Image may be NSFW.
Clik here to view.

SECM vs SIEM—not more alphabet soup, but new proactive, integrated cloud...

Forrester Research’s recent white paper, called Security’s Cloud Revolution identified a new generation of protection best practices that expands the boundaries of traditional IT security solutions by...

View Article
Browsing latest articles
Browse All 15 View Live




Latest Images