Cryptocurrencies provide a unique incentive for cybercriminals. Difficult to trace, anonymous and easily harvested with the adequate baseline of computing resources, they have already been at the center of several major incidents, including the heist of as much as $100 million Bitcoin from an online drug sales portal.Read More
The first step of the journey to the cloud for enterprises seems to be complete. The proof is that few enterprises today are running their infrastructure in an entirely cloud-free manner. Looking back over the past few years, the clear motivation for the first step to the cloud was usually cost-cutting and driving efficiency. Today,…Read More
Wow. Gartner says that, “The use of cloud computing is growing, and by 2016 this growth will increase to become the bulk of the new IT spend.” Even better, they predict, “2016 will be a defining year for cloud as private cloud begins to give way to hybrid cloud, and nearly half of large enterprises…Read More
How secure are mobile banking apps? Many individuals and organizations already trust smartphones to perform critical tasks such as reading email, working with corporate documents and conducting multi-factor authentication, so managing bank accounts would seem to be just another part of the mobile workflow.
Unless you happen to only shop at Wal-Mart, you probably have been well-versed and are extremely interested in the latest developments regarding the epic Target security breach. This will set the new bar as THE most elaborate retail heist in the history of the Internet. We discussed the latest this week on Fox Business. It…Read More
These days, it is difficult to determine whether a cloud has actually gone down. There might be a brief outage, but caching and other systems kick in, and it is largely invisible. If your cloud-resident application is available and working for 90% of your audience, but not the other 10, is the cloud up or…Read More
Updated February 12, 2014 with additional information about Target, Neiman Marcus, Michael’s and White Lodging Overview: Since December 2013, there have been a series of data breaches affecting retail stores in the United States. Because of the number of different breaches being disclosed in a short amount of time and the differing details of each,…Read More
When most IT professionals talk about cloud computing, they are thinking about infrastructure as a service (IaaS) or maybe platform as a service (PaaS). What does not come to mind easily is that a huge percentage of IaaS is put to use to drive software as a service (SaaS) offerings, and SaaS itself is the…Read More
Some IT managers feel that their organizations are increasingly fighting an uphill battle against cybercrime. A recent poll of IT professionals in the U.K. revealed that many respondents lacked confidence in their abilities to fend-off attacks at a time when data volumes continue to rise and require additional monitoring.
The most recent report from the President’s Council of Advisors on Security and Technology identified a broad range of vulnerabilities in public sector IT, but are its recommendations feasible?