Security

Keyword offers protection for a new era of fraud and cyberattacks

Keyword Chief Executive Officer Daniel Delpuech knows that organizations need a multipronged plan of attack to effectively address today’s complex and ever-evolving cyber fraud schemes. “In the past, there’s been a siloed approach, with a solution for each type of fraud,” he says. “The customer was obliged to buy several offerings, which drove up costs significantly.” […]

Continue reading

Swedish startup uses SoftLayer to globalize and comply with data protection laws

Hardly a day passes without hearing about a cyber attack or security breach. The problem is that most security technology—especially application security technology—isn’t keeping up with mobile workforces, device variations and sophisticated hackers. Fredrik Beckman, CEO of Sweden-based startup Apptimate AB, doesn’t beat around the bush on the subject. “The security technology of today is […]

Continue reading

A billion reasons you want to encrypt your data

One billion–that’s how many records were breached in 2014 alone. Media headlines demonstrate every week that large Fortune 500 companies with very well-funded cyber security operations are now regularly losing valuable sensitive information. “Encrypting” data has been heralded as the panacea for protecting against these data loss scenarios. But is this really your greatest asset […]

Continue reading

API security: Key takeaways from recent breaches

The IRS was recently in the headlines for the wrong reason: a lawsuit claims more than 330,000 taxpayer accounts were illegally accessed using the “Get Transcript” API. API breaches have for some time now plagued startups, affecting the likes of Facebook, Twitter, Buffer and Snapchat, and it’s clear these breaches are now affecting established enterprises. […]

Continue reading

How a hybrid cloud strategy can boost security

Enterprises today are facing some difficult choices. They operate in a world in which anyone anywhere—armed only with a good idea and a credit card—can compete with them on an even footing. This is possible because the cloud has democratized access to large amounts of computing power and an unprecedented breadth of services and capabilities. […]

Continue reading

Adrian Cockroft on security, open source, and what excites cloud VCs

Adrian Cockroft was a cloud architect before there were cloud architects. As Chief Architect and Director of Web Engineering at Netflix, the poster child for scaling huge computing enterprises into the cloud, he led development of the influential architecture that lets Netflix run its applications in the cloud. Having served as a distinguished engineer at […]

Continue reading

Can cloud-based security services protect your business better than your own IT department?

For enterprises that don’t embrace the cloud, security is often the No. 1 reason why. According to a Cloud Security Alliance survey released in January, the security of data in the cloud is an executive or board-level concern for 61 percent of the companies polled. For IT departments, the idea of putting corporate data beyond […]

Continue reading

How to explain cloud security to your IT team

You always have the ability to make your own ice cream, and while this takes time there is always a satisfying feeling when you taste that first bite.  Making your own ice cream is occurring less and less often and most are turning to buying ice cream in the store based on convenience and speed. I […]

Continue reading

Cloud security: How to block and tackle

In nearly every cloud study that has been published over the past couple years, security is identified as the biggest concern among executives and the strongest barrier to cloud adoption.

Continue reading

How the cloud can help you grow and remain compliant after a disaster

In this post I will be discussing how the use of cloud for disaster recovery can help you remain compliant and how it can generate new business opportunities. I will also talk briefly about what you should consider in terms of disaster recovery when building a new solution on the cloud. Cloud can provide compliance […]

Continue reading

HIPAA and cloud computing: What you need to know

Many of my clients are in the healthcare field, so a common question is if data can be managed on IBM cloud computing solutions in compliance with the Health Insurance Portability and Accountability Act (HIPAA).

Continue reading

Is cloud computing secure?

Cloud is everywhere, and it is penetrating our lives and the industry more and more, even if it is not physically visible to us. This fact may contribute to one of the major concerns about cloud: IT security and privacy. News about breaches into server systems, leaks in social media networks, industrial espionage in well-established […]

Continue reading