by Erik Grueter

What if your software could detect when it was under attack? What if files reported when, where and by whom they were opened?

Intelligent digital assets are behind an agile new security style called Information Based Security.  Developed in response to an increased use of file sharing services, personal devices, and [...]

Continue Reading

Now that cloud computing technology has already gone past the infancy stages, many industries have already realized the benefits it provides, and have already started adopting and integrating the technology to their businesses. One key sector that stands to benefit a lot [...]

Continue Reading

Israel has always had a great reputation as one of the best hubs of software innovation in the world, and so it is not a surprise that Israeli companies are also some of the early entrants into the cloud computing space. The cloud computing scene in Israel is made up of traditional [...]

Continue Reading

Cyberwar fundamentally changes how government must handle security. Faced with increasingly sophisticated attacks from gangs of cyber criminals and foreign governments probing systems for sensitive data, threats frequently go undetected for days, weeks, and even months. And it’s not just financial data being stolen. Terrorists and rogue governments may steal confidential data, [...]

Continue Reading

For those who follow the latest technology news, it is very common to read “BYOD” or Bring-Your-Own Device. The term has become popular due to the proliferation of mini-laptops, tables, and smartphones in the market today. Business owners are even mulling the idea of implementing their own Bring-Your-Own Device policy because a [...]

Continue Reading

The US Department of Defense had recently announced that it plans to provide its employees with mobile devices, computer tablets, as well as smartphones for them to be able to share protected and classified data quickly. With the latest mobile technologies, the military will be equipped with the necessary secured devices. [...]

Continue Reading

Cloud Security Alliance (CSA), a non-profit industry organization that promotes the protection techniques in the cloud, has recently updated its list of the top threats of cloud in the report entitled “The Notorious Nine Cloud Computing Top Threats in 2013”.

CSA indicates that the report reflects the consensus of the experts [...]

Continue Reading

Traders and users who want to use cloud, smartphones and tablets as mobile payment devices card processing should be cautious and wait for the availability of greater protection techniques. It is a recommendation of the PCI Security Standards Council, which considers that, in its current stage, these systems introduce new security [...]

Continue Reading

Most corporations subscribe and work through computer networks in order for their day-to-day operations to be accomplished. It is also a fact that the internet is widely patronized for research and even communications.

However, the internet is not a secure environment and is always susceptible to [...]

Continue Reading

If you are using cloud computing technology in some form, the recent Payment Card Industry Data Security Standard guidelines released should be major news for you. While it is only targeted towards organizations who are already using the technology as a big part of their cardholder data environment (CDE), the guidelines have [...]

Continue Reading

Hacked through the Clouds

On February 23, 2013 By

A series of cyber-assaults have recently targeted various banks all over the United States. A type of malware dubbed ‘itsokaynoproblembro’ or Brobot has reportedly been in action for a number of years, operating under the radar of various anti-virus programs. However, it is only recently that the virus has directly affected the [...]

Continue Reading

The European Agency for Network and Information Security Information Security Agency (ENISA) published a report that argues excessive growth of cloud computing is a double-edged risk. But the agency also recognizes the advantages of using the cloud.

Barely a week after the announcement by the European Commission of its plans [...]

Continue Reading

Securing the Cloud

On February 20, 2013 By

Cloud computing has become another key resource for IT deployments, but there is still fear of securing applications and data in the cloud. These concerns include authentication, authorization, accounting (AAA) services; encryption; storage; security breaches; regulatory compliance; location of data and users; and other risks associated with isolating sensitive corporate data. Add [...]

Continue Reading

Security and compliance concerns are still major stumbling blocks to cloud adoption. According to a study by security firm Lieberman Software, nearly 48% of members of teams in business fear of government and legal interference before putting sensitive data in the cloud.

This is a survey to close more than 300 [...]

Continue Reading

Business leaders around the world are discovering that cloud computing is more expensive than imagined at the time they decided to adopt the technology, according to KPMG survey report.

The KPMG survey, “The cloud takes shape”, polled more than 650 IT and business leaders across 16 major global markets and found [...]

Continue Reading

Around the world, Internet users are beginning to tire of giving their personal data on the Internet and the big data information collected and monetized is headed for a clash with privacy concerns.

According to tech analyst firm Ovum, netizens around the world begin to realize the amount of personal data [...]

Continue Reading
Hottest IT Skills in 2013 – Cloud, Mobile and BI
In 2012, more than 1.7 million jobs in the field of cloud computing remained unoccupied, according to analysts firm IDC. READ MORE
How Cloud Computing Influences Digital Marketing
Cloud marketing has the ability to drastically change the ways in which they reach and engage their audience, particularly with regard to distributing and storing mission-critical data. READ MORE
Gartner: BYOD to Take Center Stage For Mobile App Use by 2017
More and more companies encourage their employees to work on their devices, thus reducing the cost of computer equipment, but also increase the cost to maintain licenses and safety. READ MORE
Maturity in the Cloud: Start Thinking Like a Grown-Up
Despite the inclination to wait until all of the cloud’s kinks have been worked out, holding off on cloud initiatives until the industry matures won’t guarantee success. READ MORE
PwC: Cloud, SaaS and Mobile Are Changing Software Industry
The software industry is undergoing major changes by trends such as cloud, SaaS, mobile technology and the “consumerization of IT”. READ MORE
10 Cloud Computing Game Changers
Here are the ten most influential cloud computing companies, and the reason why. READ MORE