Preventing Data Leakage: Proactive Security from the Cloud
In business, data is currency. It is the oil that keeps the commercial engine in motion and databases are the digital banks that store and retrieve this valuable information. And, according to IDC,...
View ArticleWhen is a stack not a stack? When it’s Unified in the cloud
While trawling the blogs, feeds and news I came across an analyst’s article about best security practices in which he kept referring to “the stack.” And by this he meant a multitude of various...
View ArticleIt’s a Wonderful Cloud-a Security Carol
It’s not Wordsworth, but hopefully worth the words. Happy holidays to all of you and thank you for reading. May the season keep your perimeters protected, your assets secure and your networks free of...
View ArticleHow cloud security balances risk versus reward
I spend a great deal of my day thinking about security. How it affects the enterprise; how to best position and protect assets. How it shapes risk management and how it delivers potential benefits...
View ArticleThe New Standard: Intelligence-Driven Security
In his most recent blog post, Art Coviello, the executive chairman at RSA posed an important question. How do we move from traditional security to intelligence-driven security? In his answer he...
View ArticleSailing the 7 C’s of security monitoring
What is it your mom used to say? “A watched pot never boils.” This might be true, but a watched pot also never spills; it never allows your younger sister to stick her hand in the hot water; prevents...
View ArticleSupporting CIO strategies and priorities from the cloud-Part 1
The biggest eye-opener in Gartner’s recently-published study on the current agenda regarding the digital landscape for Chief Information Officers is that CIO’s recognize that cloud computing will not...
View ArticleSupporting CIO strategies and priorities from the cloud-Part 2
This is the second part of a two-part article entitled Supporting CIO Strategies and Priorities from the Cloud. In case you have not done so, READ PART 1. However, to briefly recap: in support of a...
View ArticleCloud-based SIEM frees that one hand tied behind your back
Have you ever been asked to fight the state boxing champion with one hand tied behind your back? Or metaphorically experience the old adage of bringing a knife to a gunfight? Many security...
View ArticleManeuvering though the IT Threatscape: A video blog
I was fortunate to receive an invitation to speak at the recent 2013 Credit Union InfoSec Conference in Las Vegas. One of the key drivers for many of the attendees is the burden of compliance and...
View ArticleSynchronization enforces control for cloud integrated IDaaS and Access...
When Olympic rowers glide across the water’s surface at speeds of more than 25 mph, it’s because all the crew are in synch with one another. It’s a collaborative effort. As appropriate…if you are of a...
View ArticleAnalyzing the Top 10 benefits of Unified Security from the cloud (Part 1)
Of all the strategies and tactics available to prevent breaches, deter data leakage and theft, control access and secure beyond the so-called network perimeter, the one that is emerging as an...
View ArticleAnalyzing the Top 10 benefits of Unified Security from the cloud (Part 2)
If you missed Part 1: read it HERE More than security from the cloud, the concept of unified security takes the method another step forward in terms of best practices—the ability to deploy a holistic...
View ArticleUnified Security: Avoid becoming a statistic
http://www.cloudaccess.com/blog/wp-content/uploads/2013/10/CloudAccess_UnifiedSecurity_wmv.wmv Take 3 minutes to learn why this best practice is not only the next evolutionary step in IT security...
View ArticleSECM vs SIEM—not more alphabet soup, but new proactive, integrated cloud...
Forrester Research’s recent white paper, called Security’s Cloud Revolution identified a new generation of protection best practices that expands the boundaries of traditional IT security solutions by...
View Article
More Pages to Explore .....