Many organizations have adopted cloud computing, BYOD practices and expanded the use of social media, all of which require new technologies and security policies. Without changes, the security of a company is probably inadequate. Companies are concerned about managing and privacy of data entrusted to service providers. It is unclear whether this is due to…

If there is one area in which the cloud operators all agree, this is the one related to the protection of personal data. A highly strategic niche that aims to help reassure their ability to preserve the privacy of their clients. Microsoft seeks to distinguish itself from other cloud service providers to businesses by leveraging…

The experience gained by the company alongside the users of the enterprise and cloud service providers of cloud computing adds an important perspective on the challenges of security in cloud, big data and Internet of Things (IoT) environments. The non-profit Cloud Security Alliance (CSA) that aims to promote the use of best practices to ensure…

According to forecasts by Gartner, by 2020 there will be in circulation of more than 26 billion connected devices. EMC Corporation forecasts the digital universe of Internet of Things has doubled every two years and may be increased 10-fold between 2013 and 2020 from 4.4 trillion to 44 trillion gigabytes. But at the same time,…

During the past year, the demand for SIEM (Security Information and Event Management) technology remained strong. The widespread adoption of the SIEM technology is driven both by the need for security and compliance with regulations. Most of security needs is the effective detection of targeted attacks and violations. Organizations are failing at early breach detection,…

The White House released a report on big data in which it calls for an update to the Electronic Communications Privacy Act (ECPA). The much-anticipated report comes at a time when there is a large scale debate going between technology, privacy, and civil rights. The report “Big Data: Seizing Opportunities, Preserving Values” focused on how…

Organizations are more than ever exposed to a large number and variety of threats and risks to cyber security. Big Data will be one of the main elements of change in the enterprises by supplying intelligence-driven models. Research firm Gartner said that big data analytics will play a crucial role in detecting crime and security…

Typically batch in nature, big data analytics allows an organization to organize and analyze vast amounts of structured and unstructured information to facilitate the detection of rogue employees, partners, or criminal or collusive rings of fraudulent or abusive activity, says Gartner analysts. A critical ingredient for success is the ability to quickly and easily integrate…

A group of experts appointed by European Commission will scrutinize how European cloud computing contracts are established. It will also try to develop a standard contract. The European Commission launched a call for applications to recruit people from the industry, academia and other profiles, to establish a group of experts whose mission is to create…

A recent report by UK publication The Guardian has revealed that the National Security Agency has a top secret program called PRISM, which gives them unbridled access to the systems of Facebook, Google, Apple, and other Internet giants from the US. The Guardian managed to verify the authenticity of the document, which consists of a…