As traditional security concepts of perimeter and end-point defense break down as a result of the proliferation of cloud services and the BYOD phenomenon, enterprises are increasingly feeling the need for greater control over access to applications. That's where automated identity and access management comes in. View full post on…
Is Your Cloud Provider Exposing Remnants of Your Data?
Security researchers report that incorrectly configured hypervisors can lead to a separation of data issue in multi-tenant environments that can expose data remnants. However, you can prevent hosting your data on 'dirty disks.' View full post on Computerworld Security News View full post on National Cyber Security » Announcements
Security concerns over a data centre in the cloud
When the company data centre moves to various cloud configurations, the provisioning of servers will need to be addressed. View full post on Techworld.com security View full post on National Cyber Security » Computer Hacking
Cloud security strategy being developed by Intel and McAfee
Intel, which last year acquired McAfee for its security expertise, is working on a tool to provide enterprises with a way to secure data stored in public or hybrid cloud environments. View full post on Techworld.com security View full post on National Cyber Security » Computer Hacking
Jitscale.com: Security of cloud computing
This infographic addresses security topics with regard to cloud computing. View full post on National Cyber Security
Security Manager’s Journal: Security concerns for a data center in the cloud
When the company data center moves to various cloud configurations, the provisioning of servers will need to be addressed. View full post on Computerworld Security News View full post on National Cyber Security » Announcements
64% of people think cloud storage is risky, but 45% still go right ahead and use it
Sophos polled people at their InfoSec Europe booth last week to find out their views on security in the workplace. Here’s what they found. View full post on Naked Security – Sophos View full post on National Cyber Security
Amazon woos enterprise with Virtual Private Cloud
Amazon Web Services is attempting coax businesses into the cloud by touting the security credentials of its Virtual Private Cloud (VPC). View full post on Techworld.com security View full post on National Cyber Security » Computer Hacking
Securing your business in the cloud
Any IT professional who has heard “send it to my Gmail” echo across the office will know how impossible it is to keep employees from using outside applications for work when those provided don’t quite meet their needs. View full post on Techworld.com security View full post on National Cyber…
BSides Austin – Security tools for the cloud, password storage, GoogleTV hacks, card key hacking and how to get ahead in IT
There were lots of fantastic presentations at BSides Austin last week, here are a few of our favorites. View full post on Naked Security – Sophos View full post on National Cyber Security