Quantcast
Channel: Cloud Security by CloudAccess.com » REACT
Browsing all 15 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Preventing Data Leakage: Proactive Security from the Cloud

In business, data is currency. It is the oil that keeps the commercial engine in motion and databases are the digital banks that store and retrieve this valuable information. And, according to IDC,...

View Article



Image may be NSFW.
Clik here to view.

When is a stack not a stack? When it’s Unified in the cloud

While trawling the blogs, feeds and news I came across an analyst’s article about best security practices in which he kept referring to “the stack.” And by this he meant a multitude of various...

View Article

Image may be NSFW.
Clik here to view.

It’s a Wonderful Cloud-a Security Carol

It’s not Wordsworth, but hopefully worth the words. Happy holidays to all of you and thank you for reading. May the season keep your perimeters protected, your assets secure and your networks free of...

View Article

Image may be NSFW.
Clik here to view.

How cloud security balances risk versus reward

I spend a great deal of my day thinking about security. How it affects the enterprise; how to best position and protect assets. How it shapes risk management and how it delivers potential benefits...

View Article

Image may be NSFW.
Clik here to view.

The New Standard: Intelligence-Driven Security

In his most recent blog post, Art Coviello, the executive chairman at RSA posed an important question. How do we move from traditional security to intelligence-driven security? In his answer he...

View Article


Image may be NSFW.
Clik here to view.

Sailing the 7 C’s of security monitoring

What is it your mom used to say? “A watched pot never boils.” This might be true, but a watched pot also never spills; it never allows your younger sister to stick her hand in the hot water; prevents...

View Article

Image may be NSFW.
Clik here to view.

Supporting CIO strategies and priorities from the cloud-Part 1

The biggest eye-opener in Gartner’s recently-published study on the current agenda regarding the digital landscape for Chief Information Officers is that CIO’s recognize that cloud computing will not...

View Article

Image may be NSFW.
Clik here to view.

Supporting CIO strategies and priorities from the cloud-Part 2

This is the second part of a two-part article entitled Supporting CIO Strategies and Priorities from the Cloud. In case you have not done so, READ PART 1. However, to briefly recap: in support of a...

View Article


Image may be NSFW.
Clik here to view.

Cloud-based SIEM frees that one hand tied behind your back

Have you ever been asked to fight the state boxing champion with one hand tied behind your back? Or metaphorically experience the old adage of bringing a knife to a gunfight? Many security...

View Article


Image may be NSFW.
Clik here to view.

Maneuvering though the IT Threatscape: A video blog

I was fortunate to receive an invitation to speak at the recent 2013 Credit Union InfoSec Conference in Las Vegas. One of the key drivers for many of the attendees is the burden of compliance and...

View Article

Image may be NSFW.
Clik here to view.

Synchronization enforces control for cloud integrated IDaaS and Access...

When Olympic rowers glide across the water’s surface at speeds of more than 25 mph, it’s because all the crew are in synch with one another. It’s a collaborative effort. As appropriate…if you are of a...

View Article

Image may be NSFW.
Clik here to view.

Analyzing the Top 10 benefits of Unified Security from the cloud (Part 1)

Of all the strategies and tactics available to prevent breaches, deter data leakage and theft, control access and secure beyond the so-called network perimeter, the one that is emerging as an...

View Article

Image may be NSFW.
Clik here to view.

Analyzing the Top 10 benefits of Unified Security from the cloud (Part 2)

If you missed Part 1: read it HERE More than security from the cloud, the concept of unified security takes the method another step forward in terms of best practices—the ability to deploy a holistic...

View Article


Unified Security: Avoid becoming a statistic

http://www.cloudaccess.com/blog/wp-content/uploads/2013/10/CloudAccess_UnifiedSecurity_wmv.wmv Take 3 minutes to learn why this best practice is not only the next evolutionary step in IT security...

View Article

Image may be NSFW.
Clik here to view.

SECM vs SIEM—not more alphabet soup, but new proactive, integrated cloud...

Forrester Research’s recent white paper, called Security’s Cloud Revolution identified a new generation of protection best practices that expands the boundaries of traditional IT security solutions by...

View Article

Browsing all 15 articles
Browse latest View live




Latest Images