A recent study, conducted by the Symform, the cloud backup provider, found that 20% of companies have no security policies or clear usage standards, to guide employees when using cloud applications or access corporate information from other devices. The survey queried nearly 500 companies including 18 percent representing enterprises, 34 percent from small and midsize…

IBM announced a wide range of security software solutions to help organizations protect their information and identities within and outside the company in massive data environments such as Big Data, mobile and cloud computing. Specifically, IBM presented ten products and improvements for organizations to deal with new security threats and challenges arising as a result…

At this time of financial uncertainty, investors want to search for a winner and it’s to be expected. They don’t want to part with their hard-earned money only to find themselves losing in the end. Most of them will troop to Amazon because it’s been touted as the number one bookseller, even beating Barnes &…

A few days ago, Cisco unveiled a set of security solutions designed to improve the robustness of data centers against the threats they constantly face while moving toward virtualized, more consolidated environments and allowing businesses to benefit from new cloud-based models. The new set of security solutions released by Cisco extend the power of security…

The Cloud Security Alliance (CSA) announced the creation of a Privacy Level Agreement (PLA) Working Group in the EU chaired by the Hong Kong Applied Science and Technology Research Institute (ASTRI), to seek solutions to improve the security, development of cloud systems that respond to the challenges of cloud development in Hong Kong. The possibilities…

Business organizations are increasingly moving towards the cloud. However, there are still some obstacles to its widespread acceptance and ongoing development. While many are happy about how things are evolving in the cloud, there are also some missing pieces that must be taken into consideration. For one, service administration is still far from being perfect….

Recent research reviewing small- to medium-size website traffic revealed that 51% of web site traffic is non-human, and that 31% is potentially damaging – automated malicious traffic from hackers, spies, scrapers, and spammers. Given these numbers, no one wants to leave a website’s “front door” open. Website owners work hard to attract quality human traffic,…

The new version of Google Wallet, based on the cloud, is updated to assure its customers get greater security in their transactions and purchases and provide compatibility with all credit and debit cards from Visa, MasterCard, American Express, and Discover. Security has been the key to this new version of NFC-enabled mobile payment platform, as…

The US Federal Financial Institutions Examination Council is focused in helping financial institutions by providing a resource document which it hopes to address and understand the risk of cloud computing. In its four-page document, Outsourced Cloud Computing, the council stressed that due diligence must be performed in assessing a cloud computing service provider rather than…