A global survey has shown that it is very common that companies of all sizes suffer damage due to the use of public cloud applications that are not managed or integrated within the company’s IT infrastructure. Symantec has released the results of a survey conducted by ReRez in the months of September and October 2012…

The last changes to the HIPAA Privacy, Security, Enforcement and Breach Rules had recently been released. Such rules were first implemented the summer of 2012. It also contains how cloud computing providers are to be treated by the healthcare industry. According to the HIPAA standard, the cloud vendors are business associates and as business associates…

Cloud Security Alliance Congresses and Summits continue to be premier gathering for IT experts and executives for industry-specific case studies that will help attendees learn and leverage best practices used by their peers in moving to a secure cloud. RSA, The Security Division of EMC, last week released a report of the Security for Business…

The number of patents registered in the U.S. hit a record last year, with the giant blue once again at the forefront of technological giants, who maintain a war on intellectual property. The Patent and Trademark Office issued 253,155 patents in 2012, of which 6478 were recorded by IBM, according to the annual tally published…

Accelerated enterprise adoption of Big Data, mobile, social media and cloud computing introduces significant gaps in security programs. RSA, The Security Division of EMC, released a report of the Security for Business Innovation Council (SBIC) that assesses how disruptive innovation, considered analysis of Big Data, cloud computing, enterprise mobility and social media will transform the…

Some large banks like ING are excited about Cloud technology due to a number of its advantages, such as zero up-front capital requirement, shared service delivery via the Internet, its pay-for-use environment, and its agility. There are also banks who are wary of the risks and are closely watching from the sidelines, waiting for clear…

Dell World 2012 brought together more than 6000 people including customers, partners, media, analysts and employees, for three days of relationship, education and induction strategy and Dell solutions to solve newer IT challenges customers facing currently. At Dell World, Dell announced that today more and more customers around the world rely on their services and…

Gartner has released what 2013 holds for IT organizations and users. The predictions of the consulting focus on economic risks, opportunities and innovations that CIOs adopt to foster a new generation of highly oriented business solutions. In the new report entitled, “Predicts 2013: Security Solutions,” Gartner states that increased adoption of cloud-based computing is expected…

The Cloud Security Alliance (CSA) has released version 1.0 of the security guidance for critical areas of mobile computing. The guide details the various elements associated with mobile computing that corporations should consider and how to apply it in your business. The document “Security Guidance for Critical Areas of Mobile Computing” at Cloud Security Alliance…

A study from the Lockheed Martin and its Cyber Security Alliance partners found that 85 percent of federal technology leaders and decision makers consider cyber security as a top most priority for Federal verticals, followed to a lesser degree by mobile computing (39%), cloud computing (26%) and big data (27%). The results of a collaborative…