Quantcast
Channel: ARN - Stories by George V. Hulme RSS feed
Browsing latest articles
Browse All 38 View Live

Clamour for Cloud apps increases corporate data breach risk

Employees bringing in their own devices and choosing their own application services is significantly increasing the risk to enterprise data.

View Article



RSA Conference 2012 sneak peek: cloud, big data, and mobile

There are fewer topics stirring bigger buzz among information security professionals than big data, Cloud security, and mobile. So it's no surprise that those topics will dominate the discussions this...

View Article

Cloud Security Alliance launches innovation program, eyes mobile threats and...

SAN FRANCISCO: Whether already computing in Cloud environments, planning to do so soon, or just thinking about it - how those systems will be kept secure is once again a topic that is front and center...

View Article

RSA Conference 2012: Former NSA director says secure Clouds can't come fast...

At the third annual Cloud Security Alliance (CSA) summit today, Michael McConnell, former director of the National Security Agency, urged the audience of 1,200 security experts to do what they can to...

View Article

Key advice: Being prepared for when the Cloud really fails

Everything works well in the Cloud, until it doesn't.

View Article


MDM: Part of the mobile security solution?

The good news for enterprises: Mobile devices are packed with power. A new iPhone is 100 times lighter, 100 times faster, and 10 times less expensive than the luggable notebooks of the early 1980s.

View Article

7 essentials for defending against DDoS attacks

Go ahead and ask CSOs from the nation's largest banks about the myriad distributed denial-of-service (DDoS) attacks they've experienced in recent months. They're not going to tell you anything.

View Article

iOS vs. Android: Which is more secure?

With millions of new iOS and Android devices pouring into the enterprise every quarter, it's important to know just how much risk these devices bring - and if one mobile operating system has an edge...

View Article


Moving toward smart and secure continuous software delivery

It's no surprise that security and application development teams often find themselves locking horns. One wants applications and new features to roll out -- and swiftly -- and the other is often more...

View Article


Cybersecurity 2014: Breaches and costs rise, confidence and budgets are low

In 2014, it seemed that no industry went unscathed. The data breaches this year were broad and deep. Software maker Adobe was hit for 152 million records. Online marketplace eBay was drained of another...

View Article

In Pictures: 10 tips to secure your iPhone

No more is it enough to think that securing your iPhone with a simple 4 digit PIN is adequate.

View Article

Six failings common to entry-level cyber security job seekers

When it comes to hiring, enterprise security teams can use all of the help that they can rally. But when it comes to hiring entry-level talent, that's not as easy as it may seem.

View Article

Six entry-level cybersecurity job seeker failings

When it comes to hiring, enterprise security teams can use all of the help that they can rally. But when it comes to hiring entry-level talent, that's not as easy as it may seem.

View Article


2015 State of Cybercrime: Enterprise fight is stuck in stall

The year of cybercrime since our most recent US State of Cybercrime Survey has been nothing less than stunning. There were the Home Depot and JP Morgan Chase data breaches, the Sony Pictures fiasco,...

View Article

When it comes to Cloud security which is better? Heavy hand or gentle policing?

When it comes to successfully managing cloud use within the enterprise, some security organizations try to establish and enforce firm lines between what is permissible and what is banned, while others...

View Article

Browsing latest articles
Browse All 38 View Live




Latest Images