Sailing the 7 C’s of security monitoring
What is it your mom used to say? “A watched pot never boils.” This might be true, but a watched pot also never spills; it never allows your younger sister to stick her hand in the hot water; prevents...
View ArticleSupporting CIO strategies and priorities from the cloud-Part 1
The biggest eye-opener in Gartner’s recently-published study on the current agenda regarding the digital landscape for Chief Information Officers is that CIO’s recognize that cloud computing will not...
View ArticleSupporting CIO strategies and priorities from the cloud-Part 2
This is the second part of a two-part article entitled Supporting CIO Strategies and Priorities from the Cloud. In case you have not done so, READ PART 1. However, to briefly recap: in support of a...
View ArticleCloud-based SIEM frees that one hand tied behind your back
Have you ever been asked to fight the state boxing champion with one hand tied behind your back? Or metaphorically experience the old adage of bringing a knife to a gunfight? Many security...
View ArticleManeuvering though the IT Threatscape: A video blog
I was fortunate to receive an invitation to speak at the recent 2013 Credit Union InfoSec Conference in Las Vegas. One of the key drivers for many of the attendees is the burden of compliance and...
View ArticleSynchronization enforces control for cloud integrated IDaaS and Access...
When Olympic rowers glide across the water’s surface at speeds of more than 25 mph, it’s because all the crew are in synch with one another. It’s a collaborative effort. As appropriate…if you are of a...
View ArticleAnalyzing the Top 10 benefits of Unified Security from the cloud (Part 1)
Of all the strategies and tactics available to prevent breaches, deter data leakage and theft, control access and secure beyond the so-called network perimeter, the one that is emerging as an...
View ArticleAnalyzing the Top 10 benefits of Unified Security from the cloud (Part 2)
If you missed Part 1: read it HERE More than security from the cloud, the concept of unified security takes the method another step forward in terms of best practices—the ability to deploy a holistic...
View ArticleUnified Security: Avoid becoming a statistic
http://www.cloudaccess.com/blog/wp-content/uploads/2013/10/CloudAccess_UnifiedSecurity_wmv.wmv Take 3 minutes to learn why this best practice is not only the next evolutionary step in IT security...
View ArticleSECM vs SIEM—not more alphabet soup, but new proactive, integrated cloud...
Forrester Research’s recent white paper, called Security’s Cloud Revolution identified a new generation of protection best practices that expands the boundaries of traditional IT security solutions by...
View Article
More Pages to Explore .....